A survey on the evolution of bootkits attack and defense techniques

被引:0
|
作者
Zhou, Yilin [1 ,2 ]
Peng, Guojun [1 ,2 ]
Li, Zichuan [1 ,2 ]
Liu, Side [1 ,2 ]
机构
[1] Minist Educ, Key Lab Aerosp Informat Secur & Trust Comp, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
关键词
Security; Microprogramming; Codes; Rootkit; Computer security; Computational modeling; Biological system modeling; bootkit; hook; legacy BIOS; security mechanisms; UEFI;
D O I
10.23919/JCC.ja.2022-0409
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
According to the boot process of modern computer systems, whoever boots first will gain control first. Taking advantage of this feature, a malicious code called bootkit can hijack the control before the OS bootloader and bypass security mechanisms in boot process. That makes bootkits difficult to detect or clean up thoroughly. With the improvement of security mechanisms and the emergence of UEFI, the attack and defense techniques for bootkits have constantly been evolving. We first introduce two boot modes of modern computer systems and present an attack model of bootkits by some sophistical samples. Then we discuss some classic attack techniques used by bootkits from their initial appearance to the present on two axes, including boot mode axis and attack phase axis. Next, we evaluate the race to the bottom of the system and the evolution process between bootkits and security mechanisms. At last, we present the possible future direction for bootkits in the context of continuous improvement of OS and firmware security mechanisms.
引用
收藏
页码:102 / 130
页数:29
相关论文
共 50 条
  • [21] An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN
    Avila, Karen
    Sanmartin, Paul
    Jabba, Daladier
    Gomez, Javier
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3687 - 3718
  • [22] A Survey on Resource Inflated Denial of Service Attack Defense Mechanisms
    Chand, Nithun O.
    Mathivanan, S.
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [23] A Survey of DMFBs Security: State-of-the-Art Attack and Defense
    Dong, Chen
    Liu, Lingqing
    Liu, Huangda
    Guo, Wenzhong
    Huang, Xing
    Lian, Sihuang
    Liu, Ximeng
    Ho, Tsung-Yi
    PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 14 - 20
  • [24] Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey
    Tan, Hao
    Wang, Le
    Zhang, Huan
    Zhang, Junjian
    Shafiq, Muhammad
    Gu, Zhaoquan
    ELECTRONICS, 2022, 11 (14)
  • [25] Survey of Backdoor Attack and Defense Algorithms Based on Federated Learning
    Liu, Jialang
    Guo, Yanming
    Lao, Mingrui
    Yu, Tianyuan
    Wu, Yulun
    Feng, Yunhao
    Wu, Jiazhuang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2607 - 2626
  • [26] Adversarial attack and defense technologies in natural language processing: A survey
    Qiu, Shilin
    Liu, Qihe
    Zhou, Shijie
    Huang, Wen
    NEUROCOMPUTING, 2022, 492 : 278 - 307
  • [27] A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense
    Guo, Wenzhong
    Lian, Sihuang
    Dong, Chen
    Chen, Zhenyi
    Huang, Xing
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2022, 27 (04)
  • [28] Survey of Security Attack and Defense Strategies for Artificial Intelligence Model
    Qin, Zhen
    Zhuang, Tianming
    Zhu, Guosong
    Zhou, Erqiang
    Ding, Yi
    Geng, Ji
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2627 - 2648
  • [29] A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
    Oz, Harun
    Aris, Ahmet
    Levi, Albert
    Uluagac, A. Selcuk
    ACM COMPUTING SURVEYS, 2022, 54 (11S)
  • [30] DDoS attack detection techniques in IoT networks: a survey
    Pakmehr, Amir
    Assmuth, Andreas
    Taheri, Negar
    Ghaffari, Ali
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14637 - 14668