A survey on the evolution of bootkits attack and defense techniques

被引:0
|
作者
Zhou, Yilin [1 ,2 ]
Peng, Guojun [1 ,2 ]
Li, Zichuan [1 ,2 ]
Liu, Side [1 ,2 ]
机构
[1] Minist Educ, Key Lab Aerosp Informat Secur & Trust Comp, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
关键词
Security; Microprogramming; Codes; Rootkit; Computer security; Computational modeling; Biological system modeling; bootkit; hook; legacy BIOS; security mechanisms; UEFI;
D O I
10.23919/JCC.ja.2022-0409
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
According to the boot process of modern computer systems, whoever boots first will gain control first. Taking advantage of this feature, a malicious code called bootkit can hijack the control before the OS bootloader and bypass security mechanisms in boot process. That makes bootkits difficult to detect or clean up thoroughly. With the improvement of security mechanisms and the emergence of UEFI, the attack and defense techniques for bootkits have constantly been evolving. We first introduce two boot modes of modern computer systems and present an attack model of bootkits by some sophistical samples. Then we discuss some classic attack techniques used by bootkits from their initial appearance to the present on two axes, including boot mode axis and attack phase axis. Next, we evaluate the race to the bottom of the system and the evolution process between bootkits and security mechanisms. At last, we present the possible future direction for bootkits in the context of continuous improvement of OS and firmware security mechanisms.
引用
收藏
页码:102 / 130
页数:29
相关论文
共 50 条
  • [1] A Survey on the Evolution of Bootkits Attack and Defense Techniques
    Yilin Zhou
    Guojun Peng
    Zichuan Li
    Side Liu
    China Communications, 2024, 21 (01) : 102 - 130
  • [2] A Survey of Attack and Defense Techniques for Reputation Systems
    Hoffman, Kevin
    Zage, David
    Nita-Rotaru, Cristina
    ACM COMPUTING SURVEYS, 2009, 42 (01)
  • [3] Adversarial Attack and Defense: A Survey
    Liang, Hongshuo
    He, Erlu
    Zhao, Yangyang
    Jia, Zhe
    Li, Hao
    ELECTRONICS, 2022, 11 (08)
  • [4] Buffer Overflow Attack and Defense Techniques
    Alzahrani, Sabah M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 207 - 212
  • [5] Survey of Textual Backdoor Attack and Defense
    Zheng M.
    Lin Z.
    Liu Z.
    Fu P.
    Wang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (01): : 221 - 242
  • [6] A Survey on Latest Botnet Attack and Defense
    Zhang, Lei
    Yu, Shui
    Wu, Di
    Watters, Paul
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 53 - 60
  • [7] Research on Basketball Confrontation Techniques in Attack and Defense
    Qiang, Wei
    Mei, Zhao Xiao
    Chao, Xie
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 534 - 538
  • [8] Adversarial Attack and Defense on Graph Data: A Survey
    Sun, Lichao
    Dou, Yingtong
    Yang, Carl
    Zhang, Kai
    Wang, Ji
    Yu, Philip S.
    He, Lifang
    Li, Bo
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (08) : 7693 - 7711
  • [9] Moving Target Defense Techniques: A Survey
    Lei, Cheng
    Zhang, Hong-Qi
    Tan, Jing-Lei
    Zhang, Yu-Chen
    Liu, Xiao-Hu
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [10] Defense techniques of SYN flood attack characterization and comparisons
    Ghanti, Shaila
    Naik, G.M.
    International Journal of Network Security, 2018, 20 (04) : 721 - 729