{"title":"简单的SMM rootkit的设计","authors":"Michal Szaknis, K. Szczypiorski","doi":"10.1145/3514105.3514114","DOIUrl":null,"url":null,"abstract":"Nowadays, computer threats are becoming more and more sophisticated and dangerous as the time progresses along with the technology. Recently, the antivirus software and protection mechanisms have advanced to a point where attacking the operating systems is becoming so hard that malware creators started to shift towards either the easier ways or paths currently unexplored to a full extend. One of such fields which has been gaining attention for the last several years is firmware security. Researchers started to find various vulnerabilities enabling an attacker to take full control over victim’s computer.","PeriodicalId":360718,"journal":{"name":"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The design of the simple SMM rootkit\",\"authors\":\"Michal Szaknis, K. Szczypiorski\",\"doi\":\"10.1145/3514105.3514114\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, computer threats are becoming more and more sophisticated and dangerous as the time progresses along with the technology. Recently, the antivirus software and protection mechanisms have advanced to a point where attacking the operating systems is becoming so hard that malware creators started to shift towards either the easier ways or paths currently unexplored to a full extend. One of such fields which has been gaining attention for the last several years is firmware security. Researchers started to find various vulnerabilities enabling an attacker to take full control over victim’s computer.\",\"PeriodicalId\":360718,\"journal\":{\"name\":\"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3514105.3514114\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3514105.3514114","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowadays, computer threats are becoming more and more sophisticated and dangerous as the time progresses along with the technology. Recently, the antivirus software and protection mechanisms have advanced to a point where attacking the operating systems is becoming so hard that malware creators started to shift towards either the easier ways or paths currently unexplored to a full extend. One of such fields which has been gaining attention for the last several years is firmware security. Researchers started to find various vulnerabilities enabling an attacker to take full control over victim’s computer.