메뉴 건너뛰기




Volumn 6, Issue 12, 2013, Pages 1590-1605

SMM rootkit: A new breed of OS independent malware

Author keywords

Hardware security; Malware; Operating system security; Rootkit; System management mode

Indexed keywords

COMPUTER CRIME; COMPUTER HARDWARE; HARDWARE; HARDWARE SECURITY;

EID: 84888412363     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.166     Document Type: Article
Times cited : (45)

References (29)
  • 1
    • 0032260307 scopus 로고    scopus 로고
    • A Framework for Modeling Trojans and Computer Virus Infections
    • Thimbleby H, Anderson S, Cairns P.A Framework for Modeling Trojans and Computer Virus Infections.The Computer Journal, 1998;41(7):444-458.
    • (1998) The Computer Journal , vol.41 , Issue.7 , pp. 444-458
    • Thimbleby, H.1    Anderson, S.2    Cairns, P.3
  • 2
    • 84888405557 scopus 로고    scopus 로고
    • The FU rootkit.
    • Fuzen Op.The FU rootkit.http://www.rootkit.com/project.php?id=12
    • Fuzen, O.1
  • 3
    • 67651038840 scopus 로고    scopus 로고
    • A REAL NT Rootkit, patching the NT Kernel
    • Hoglund G.A REAL NT Rootkit, patching the NT Kernel. InPhrack Magazine, Vol.9, No 55 1999.
    • (1999) Phrack Magazine , vol.9 , Issue.55
    • Hoglund, G.1
  • 4
    • 84888423690 scopus 로고    scopus 로고
    • VICE-Catch the Hookers. Presented at Black Hat USA. August.
    • Butler J.VICE-Catch the Hookers. Presented at Black Hat USA. August2004.
    • (2004)
    • Butler, J.1
  • 5
    • 33751032041 scopus 로고    scopus 로고
    • Subvirt: Implementing malware with virtual machines. In Proceedings of IEEE Symposium on Security and Privacy (S & p' 06) pages-, Washington, DC, USA, IEEE Computer Society.
    • King ST, Chen PM, Wang Y-M, Verbowski C, Wang HJ, Lorch JR.Subvirt: Implementing malware with virtual machines. In Proceedings of IEEE Symposium on Security and Privacy (S & p' 06) pages314-327, Washington, DC, USA, 2006; IEEE Computer Society.
    • (2006) , pp. 314-327
    • King, S.T.1    Chen, P.M.2    Wang, Y.-M.3    Verbowski, C.4    Wang, H.J.5    Lorch, J.R.6
  • 6
    • 84888410159 scopus 로고    scopus 로고
    • Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3B: System Programming Guide, Part 2. May.
    • Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3B: System Programming Guide, Part 2. May2007.
    • (2007)
  • 7
    • 84888410799 scopus 로고    scopus 로고
    • Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3A: System Programming Guide, Part 1. May.
    • Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3A: System Programming Guide, Part 1. May2007.
    • (2007)
  • 8
    • 84888411060 scopus 로고    scopus 로고
    • Butler, Shadow Walker: J. Raising the Bar for Windows Rootkit Detection. In Phrack Volume 0x0B, Issue 0x3D, Phile #0x08 of 0x14.
    • Sparks S, Butler, Shadow Walker: J. Raising the Bar for Windows Rootkit Detection. In Phrack Volume 0x0B, Issue 0x3D, Phile #0x08 of 0x142005.
    • (2005)
    • Sparks, S.1
  • 9
    • 84888399103 scopus 로고    scopus 로고
    • New Blue Pill
    • Rutkowska J.New Blue Pill.www.bluepillproject.org/stuff/nbp-0.11.zip2007.
    • (2007)
    • Rutkowska, J.1
  • 10
    • 84888419873 scopus 로고    scopus 로고
    • Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, August.
    • Rutkowska J.Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, August2006.
    • (2006)
    • Rutkowska, J.1
  • 11
    • 84888395189 scopus 로고    scopus 로고
    • Hardware Virtualization Rootkits. Presented at Black Hat USA, Aug;
    • Zovi. DA.Hardware Virtualization Rootkits. Presented at Black Hat USA, Aug2006;www.theta44.org/software/HVM_Rootkits_ddz_bh-usa-06.pdf
    • (2006)
    • Zovi, D.A.1
  • 12
    • 84888424302 scopus 로고    scopus 로고
    • Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal,.
    • Heasman J.Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal, 2006.
    • (2006)
    • Heasman, J.1
  • 13
    • 84888410604 scopus 로고    scopus 로고
    • RootkitRevealer v1.71. November 1,;
    • Cogswell B, Russinovich M.RootkitRevealer v1.71. November 1, 2006;Http://www.microsoft.com/technet/sysinternals/Utilities/RootkitRevealer.mspx
    • (2006)
    • Cogswell, B.1    Russinovich, M.2
  • 14
    • 84888399290 scopus 로고    scopus 로고
    • F-Secure Black Light.
    • F-Secure Black Light.http://www.f-secure.com/blacklight
  • 15
    • 84888415698 scopus 로고    scopus 로고
    • Using CPU system management mode to circumvent operating System security functions. In DCSSI 51 bd. De la Tour Maubourg 75700 Paris Cedex, France.
    • Duflot L, Etiemble D, Grumelard O.Using CPU system management mode to circumvent operating System security functions. In DCSSI 51 bd. De la Tour Maubourg 75700 Paris Cedex, France2007.
    • (2007)
    • Duflot, L.1    Etiemble, D.2    Grumelard, O.3
  • 16
    • 84888398088 scopus 로고    scopus 로고
    • Intel Corporation.Intel 845GE/845PE Chipset Datasheet. October.
    • Intel Corporation.Intel 845GE/845PE Chipset Datasheet. October2002.
    • (2002)
  • 17
    • 84888398012 scopus 로고    scopus 로고
    • Intel Corporation.Intel 82801DB I/O Controller Hub 4 (ICH4). May.
    • Intel Corporation.Intel 82801DB I/O Controller Hub 4 (ICH4). May2002.
    • (2002)
  • 18
    • 84888409771 scopus 로고    scopus 로고
    • Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat, Federal
    • Heasman J.Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat, Federal
    • Heasman, J.1
  • 19
    • 84888395691 scopus 로고    scopus 로고
    • Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional,.
    • Butler J, Hoglund G.Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, 2005.
    • (2005)
    • Butler, J.1    Hoglund, G.2
  • 20
    • 84888417180 scopus 로고    scopus 로고
    • 8042] Keyboard Controller.heim.ifi.uio.no/
    • [8042] Keyboard Controller.heim.ifi.uio.no/
  • 21
    • 84888414588 scopus 로고    scopus 로고
    • quot;Rootkits vs. Stealth by Design Malware", Presented at Black Hat, Europe.
    • Rutkowska J."Rootkits vs. Stealth by Design Malware", Presented at Black Hat, Europe2006.
    • (2006)
    • Rutkowska, J.1
  • 22
    • 84888417457 scopus 로고    scopus 로고
    • Support for USB and Legacy Keyboards and Mouse Devices. December;microsoft.com/whdc/device/input/usbhost.mspx
    • Support for USB and Legacy Keyboards and Mouse Devices. December2001;microsoft.com/whdc/device/input/usbhost.mspx
    • (2001)
  • 23
    • 84888422873 scopus 로고    scopus 로고
    • www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Heasman.pdf
  • 24
    • 84888395495 scopus 로고    scopus 로고
    • Windbg.en.wikipedia.org/wiki/WinDbg.
    • Windbg.en.wikipedia.org/wiki/WinDbg2007.
    • (2007)
  • 25
    • 84888407623 scopus 로고    scopus 로고
    • Implementing and detecting a PCI Rootkit. Presented at Black Hat Federal.
    • Heasman J.Implementing and detecting a PCI Rootkit. Presented at Black Hat Federal2007.
    • (2007)
    • Heasman, J.1
  • 26
    • 53349091372 scopus 로고    scopus 로고
    • Compatibility is Not Transparency: VMM Detection Mythis and Realities. In HotOS XI: 11th Workshop on Hot Topics in Operating Systems; USENIX.
    • Garfinkel T, Adams K, Warfield A, Franklin J.Compatibility is Not Transparency: VMM Detection Mythis and Realities. In HotOS XI: 11th Workshop on Hot Topics in Operating Systems2007; USENIX.
    • (2007)
    • Garfinkel, T.1    Adams, K.2    Warfield, A.3    Franklin, J.4
  • 27
    • 84888403135 scopus 로고    scopus 로고
    • System Virginity Verifier-Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box. September.
    • Rutkowska J.System Virginity Verifier-Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box. September2005.
    • (2005)
    • Rutkowska, J.1
  • 28
    • 85084162914 scopus 로고    scopus 로고
    • Copilot-A Coprocessor-based Kernel Runtime Integrity Monitor. In Proceeding Usenix Security Symposium August.
    • Petroni NL, Fraser T, Molina J, Arbaugh WA.Copilot-A Coprocessor-based Kernel Runtime Integrity Monitor. In Proceeding Usenix Security Symposium August2004.
    • (2004)
    • Petroni, N.L.1    Fraser, T.2    Molina, J.3    Arbaugh, W.A.4
  • 29
    • 84888423611 scopus 로고    scopus 로고
    • Windows rootkits of2005, Part 2.
    • Butler J, Sparks S.Windows rootkits of2005, Part 2.http://www.securityfocus.com/infocus/18512005.
    • (2005)
    • Butler, J.1    Sparks, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.