A spyware detection method for firmware based cyber attacks

一种针对基于固件的网络攻击的间谍软件检测方法

阅读:1

Abstract

The process of developing and evolving the firmware in today's computers has reached a stage where it may be successfully attacked in some situations, and in the scope of these attacks, there is also the installation of additional codes and spyware on it. Meanwhile, there is no comprehensive method to notify the user or server administrator about this type of attack. In this paper we will introduce a workaround that covers the recognition of such attacks on almost all systems based on the 'x86' architecture, according to the structure of SPI flash provided for them and the idea of FWH from its first generation to today's designs. To test this solution and to make it more accessible to researchers and enthusiasts, we have also produced the sample code of this method which can be used on real systems and has been placed on GitHub. In this method, which is called BIOSIC, the correctness of the executable code of the firmware is evaluated based on OEM version comparisons, SPI hardware specifications and characteristics of the firmware status control. Compared to other methods, this method brings superiority in recognizing all firmware changes, including unknown spyware attacks, unsuccessful spyware attacks and providing a possibility to prevent them.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。