A survey on the evolution of bootkits attack and defense techniques

被引:0
|
作者
Zhou, Yilin [1 ,2 ]
Peng, Guojun [1 ,2 ]
Li, Zichuan [1 ,2 ]
Liu, Side [1 ,2 ]
机构
[1] Minist Educ, Key Lab Aerosp Informat Secur & Trust Comp, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
关键词
Security; Microprogramming; Codes; Rootkit; Computer security; Computational modeling; Biological system modeling; bootkit; hook; legacy BIOS; security mechanisms; UEFI;
D O I
10.23919/JCC.ja.2022-0409
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
According to the boot process of modern computer systems, whoever boots first will gain control first. Taking advantage of this feature, a malicious code called bootkit can hijack the control before the OS bootloader and bypass security mechanisms in boot process. That makes bootkits difficult to detect or clean up thoroughly. With the improvement of security mechanisms and the emergence of UEFI, the attack and defense techniques for bootkits have constantly been evolving. We first introduce two boot modes of modern computer systems and present an attack model of bootkits by some sophistical samples. Then we discuss some classic attack techniques used by bootkits from their initial appearance to the present on two axes, including boot mode axis and attack phase axis. Next, we evaluate the race to the bottom of the system and the evolution process between bootkits and security mechanisms. At last, we present the possible future direction for bootkits in the context of continuous improvement of OS and firmware security mechanisms.
引用
收藏
页码:102 / 130
页数:29
相关论文
共 50 条
  • [41] Survey of Adversarial Attack, Defense and Robustness Analysis for Natural Language Processing
    Zheng H.
    Chen J.
    Zhang Y.
    Zhang X.
    Ge C.
    Liu Z.
    Ouyang Y.
    Ji S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1727 - 1750
  • [42] Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
    Fang, Weidong
    Zhang, Wuxiong
    Chen, Wei
    Pan, Tao
    Ni, Yepeng
    Yang, Yinxuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [43] Research survey on defense strategy of attack threat in cyber physical systems
    Wen, Cheng-Lin
    Yang, Li
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2024, 41 (12): : 2224 - 2236
  • [44] A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security
    Yan, Senming
    Ren, Jing
    Wang, Wei
    Sun, Limin
    Zhang, Wei
    Yu, Quan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 467 - 496
  • [45] Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges
    Dong, Junhao
    Chen, Junxi
    Xie, Xiaohua
    Lai, Jianhuang
    Chen, Hao
    ACM Computing Surveys, 2024, 57 (03)
  • [46] A Security Resilience Metric Framework Based on the Evolution of Attack and Defense Scenarios
    Zuo, Jinxin
    Guo, Ziyu
    An, Tong
    Xu, Zhongwei
    Lu, Yueming
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (19) : 17007 - 17021
  • [47] A Survey of Attack and Defense Techniques for Federated Learning Systems; [联邦学习系统攻击与防御技术研究综述]
    Gao Y.
    Chen X.-F.
    Zhang Y.-Y.
    Wang W.
    Deng H.-H.
    Duan P.
    Chen P.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (09): : 1781 - 1805
  • [48] A Survey of Advanced Border Gateway Protocol Attack Detection Techniques
    Scott, Ben A.
    Johnstone, Michael N.
    Szewczyk, Patryk
    Sensors, 2024, 24 (19)
  • [49] Edge-HetIoT defense against DDoS attack using learning techniques
    Mahadik, Shalaka S.
    Pawar, Pranav M.
    Muthalagu, Raja
    COMPUTERS & SECURITY, 2023, 132
  • [50] A Survey on Attack Detection on Cloud using Supervised Learning Techniques
    Nenvani, Geetanjali
    Gupta, Huma
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,