2020
DOI: 10.1016/j.fsidi.2020.300919
|View full text |Cite
|
Sign up to set email alerts
|

BMCLeech: Introducing Stealthy Memory Forensics to BMC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Today "Open Compute Project" [26] compliant bare-metal servers and "OpenPower Servers" [27] are being shipped with BMC hardware that can run OpenBMC firmware. BM-CLeech [28] is a method for capturing a snapshot of baremetal server's host complex memory from the BMC complex (running OpenBMC) in a stealthy manner for forensic investigation. The proposed NASCENT is designed to run on OpenBMC and also on proprietary BMC hardware using an OpenBMC proxy.…”
Section: Related Workmentioning
confidence: 99%
“…Today "Open Compute Project" [26] compliant bare-metal servers and "OpenPower Servers" [27] are being shipped with BMC hardware that can run OpenBMC firmware. BM-CLeech [28] is a method for capturing a snapshot of baremetal server's host complex memory from the BMC complex (running OpenBMC) in a stealthy manner for forensic investigation. The proposed NASCENT is designed to run on OpenBMC and also on proprietary BMC hardware using an OpenBMC proxy.…”
Section: Related Workmentioning
confidence: 99%