Research on Malicious Behavior of Firmware Based on Hardware Resources Access Control

Article Preview

Abstract:

As same as the traditional application and system software, firmware also faced the risk of malicious code like hobbyhorse, back door, logical bomb and so on. Firmware exhibited strong cohesion and hardware relativity, which make the malicious action in firmware to be different from that in the traditional software. This paper analyzed the specificities of firmware and the malicious behaviour about it, then expatiate the essence of the malicious behaviour of the firmware, and presented a firmware formal definition and detecting method which was based on the hardware resources access control policy. Experimental results proved that the method was effective to detect the malicious firmware.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

737-743

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou (2008) Designing and implementing malicious hardware. In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) 1(6): 363-376.

Google Scholar

[2] Z. L. Zhou, J. P. Fan, N. Zhang, And R. S. Xu (2009) Advance and Development of Computer Firmware Security Research, Proceedings of the 2009 International Symposium on Information Processing, Huangshan, P. R. China 258-262.

Google Scholar

[3] http: /www. National defence magazine. Org/archive/2010/ February/ Pages/ Malicious Firmware Could Sabotage Military, Security Systems. Asps.

Google Scholar

[4] Cohen F (1987) Computer viruses-theory and experiments. Computers and Security 4(1): 22-35.

Google Scholar

[5] Chess David M, White Steve R (2000) an undetectable computer virus/Proceedings of the Virus Bulletin Conference. Orland, FL 5(3): 411-415.

Google Scholar

[6] G. Necula (1997) Proof-Carrying Code, Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 6(8): 106-119.

DOI: 10.1145/263699.263712

Google Scholar

[7] Matt Bishop (2005) Computer Security Art and Science 7(5): 435-436.

Google Scholar

[8] HE Hong-Jun, LUO Li, DONG Li-Ming etc (2010) Formal Definition of Generalized Virus and Its Identifying Algorithm CHINESE JOURNAL OF COMPUTERS 8(3): 562-568.

DOI: 10.3724/sp.j.1016.2010.00562

Google Scholar