作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (13): 99-101,111. doi: 10.3969/j.issn.1000-3428.2012.13.028

• 安全技术 • 上一篇    下一篇

统一可扩展固件接口攻击方法研究

唐文彬,祝跃飞,陈嘉勇   

  1. (解放军信息工程大学信息工程学院,郑州 450002)
  • 收稿日期:2011-11-01 出版日期:2012-07-05 发布日期:2012-07-05
  • 作者简介:唐文彬(1989-),男,硕士研究生,主研方向:信息安全;祝跃飞,教授、博士生导师;陈嘉勇,博士研究生
  • 基金资助:
    国家“863”计划基金资助项目(2008AA01Z420)

Research on Attack Method of Unified Extensible Firmware Interface

TANG Wen-bin, ZHU Yue-fei, CHEN Jia-yong   

  1. (Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002, China)
  • Received:2011-11-01 Online:2012-07-05 Published:2012-07-05

摘要: 通过分析统一可扩展固件接口(UEFI)的体系架构和执行流程,发现由于未对加载的可扩展固件接口(EFI)驱动和应用程序进行校验,导致其存在安全隐患,并相应提出3种UEFI的攻击方法,即感染OS Loader、篡改NVRAM变量和插入EFI runtime driver。分析结果表明,这3种方法都能实现操作系统内核劫持。

关键词: 统一可扩展固件接口, 安全性分析, Hook技术, 内核劫持

Abstract: By analyzing framework and boot sequence of Unified Extensible Firmware Interface(UEFI), this paper finds out that UEFI does not verify its Extensible Firmware Interface(EFI) driver and EFI application and it leads to some secure problems. Three methods of attacking UEFI are proposed, including OS Loader infecting, NVRAM variable modification and EFI runtime driver injection. Analysis result shows that all of the methods can hijack the operating system kernel.

Key words: Unified Extensible Firmware Interface(UEFI), security analysis, Hook technology, kernel hijack

中图分类号: