[1]
John Heasman. Implementing and Detecting an ACPI BIOS Rootkit. Blackhat DC, (2006).
Google Scholar
[2]
John Heasman. Implementing and Detecting an PCI Rootkit. Blackhat DC, (2007).
Google Scholar
[3]
Zhenliu Zhou, Baoxu Liu, Yaping Chi, Rongsheng Xu. Research on Computer BIOS Security Threat Analysis and Detecting System. Journal of Computer Engineering, 2007, 33(16), 114-116.
Google Scholar
[4]
Icelord. BIOS Rootkit: Welcome home, my Lord[EB/OL]. http: /blog. csdn. net/icelord/archive/2007/05/11/1604884. aspx.
Google Scholar
[5]
Intel. Extensible Firmware Interface Specification Version 1. 10. December, (2002).
Google Scholar
[6]
UEFI Forum. Unified Extensible Firmware Interface Specification Version 2. 0. January, (2006).
Google Scholar
[7]
Intel. Intel Platform Innovation Framework for EFI Architecture Specification Version 0. 9. September (2003).
Google Scholar
[8]
Zhenliu Zhou, Rongsheng Xu. BIOS Security Analysis and a kind of Trusted BIOS. ICICS 2007, Lecture Notes in Computer Science 4861, pp.427-437. Springer (2007).
DOI: 10.1007/978-3-540-77048-0_33
Google Scholar
[9]
TCG. TCG Specification Architecture Overview Specification Revision 1. 4. August (2007).
Google Scholar
[10]
TCG. TCG PC Specific Implementation Specification Version 1. 1. August (2003).
Google Scholar
[11]
Rafal Wojtczuk, Joanna Rutkowska. Attacking SMM Memory via Intel® CPU Cache Poisoning. Blackhat DC, (2009).
Google Scholar
[12]
Rafal Wojtczuk, Joanna Rutkowska. Attacking Intel® Trusted Execution Technology. Blackhat DC, (2009).
Google Scholar
[13]
Anderson, J. P. Computer Security Technology Planning Study, ESD-TR-73-51, vol. I, ESD/AFSC, Hanscom AFB, Bedford, Mass., October 1972 (NTIS AD-758 206).
Google Scholar