2019
DOI: 10.3103/s0146411619080224
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Alas, increased complexity implies a greater security risk. A well-known example highlighting this risk, and our tendency to ignore it, is the fact that many were surprised to learn that Intel's Management Engine (ME) was running a full Minix OS capable of accessing the local hardware without the end-user's knowledge [18]; ME exploits shortly followed [15,39]. Another example is the Thunderstrike boot kit that leverages compromised thunderbolt accessories to subvert the UEFI boot firmware [22].…”
Section: Introductionmentioning
confidence: 99%
“…Alas, increased complexity implies a greater security risk. A well-known example highlighting this risk, and our tendency to ignore it, is the fact that many were surprised to learn that Intel's Management Engine (ME) was running a full Minix OS capable of accessing the local hardware without the end-user's knowledge [18]; ME exploits shortly followed [15,39]. Another example is the Thunderstrike boot kit that leverages compromised thunderbolt accessories to subvert the UEFI boot firmware [22].…”
Section: Introductionmentioning
confidence: 99%