摘要: 通过分析统一可扩展固件接口(UEFI)的体系架构和执行流程,发现由于未对加载的可扩展固件接口(EFI)驱动和应用程序进行校验,导致其存在安全隐患,并相应提出3种UEFI的攻击方法,即感染OS Loader、篡改NVRAM变量和插入EFI runtime driver。分析结果表明,这3种方法都能实现操作系统内核劫持。
关键词:
统一可扩展固件接口,
安全性分析,
Hook技术,
内核劫持
Abstract: By analyzing framework and boot sequence of Unified Extensible Firmware Interface(UEFI), this paper finds out that UEFI does not verify its Extensible Firmware Interface(EFI) driver and EFI application and it leads to some secure problems. Three methods of attacking UEFI are proposed, including OS Loader infecting, NVRAM variable modification and EFI runtime driver injection. Analysis result shows that all of the methods can hijack the operating system kernel.
Key words:
Unified Extensible Firmware Interface(UEFI),
security analysis,
Hook technology,
kernel hijack
中图分类号:
唐文彬, 祝跃飞, 陈嘉勇. 统一可扩展固件接口攻击方法研究[J]. 计算机工程, 2012, 38(13): 99-101,111.
TANG Wen-Ban, CHU Ti-Fei, CHEN Jia-Yong. Research on Attack Method of Unified Extensible Firmware Interface[J]. Computer Engineering, 2012, 38(13): 99-101,111.