【24h】

The SMM Rootkit Revisited: Fun with USB

机译:回顾SMM Rootkit:USB带来的乐趣

获取原文

摘要

System Management Mode (SMM) in x86 has enabled a new class of malware with incredible power to control physical hardware that is virtually impossible to detect by the host operating system. Previous SMM root kits have only scratched the surface by modifying kernel data structures and trapping on I/O registers to implement PS/2 key loggers. In this paper, we present new SMM-based malware that hijacks Universal Serial Bus (USB) host controllers to intercept USB events. This enables SMM root kits to control USB devices directly without ever permitting the OS kernel to receive USB-related hardware interrupts. Using this approach, we created a proof-of-concept USB key logger that is also more difficult to detect than prior SMM-based key loggers that are triggered on OS actions like port I/O. We also propose additional extensions to this technique and methods to prevent and mitigate such attacks.
机译:x86中的系统管理模式(SMM)启用了一种新型的恶意软件,它具有强大的功能来控制物理硬件,而这实际上是主机操作系统无法检测到的。以前的SMM根工具包仅通过修改内核数据结构并捕获I / O寄存器以实现PS / 2键盘记录程序而刮花了表面。在本文中,我们介绍了一种新的基于SMM的恶意软件,该恶意软件劫持了通用串行总线(USB)主机控制器以拦截USB事件。这使SMM根套件可以直接控制USB设备,而无需允许OS内核接收与USB相关的硬件中断。使用这种方法,我们创建了一个概念验证的USB密钥记录器,它比以前的基于SMM的密钥记录器更难检测,后者是在OS操作(例如端口I / O)上触发的。我们还建议对此技术和方法进行其他扩展,以防止和缓解此类攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号