|
Einrichtungen >> Technische Fakultät (TF) >> Department Informatik (INF) >> Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen) >>
|
Forensic BIOS/UEFI
- Art der Arbeit:
- Bachelor Thesis
- Betreuer:
- Latzo, Tobias
Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen) E-Mail: tobias.latzo@fau.de
- Beschreibung der Arbeit:
- The System Management Mode (SMM) [1] is the most privileged operation mode of an x86 CPU. Often it is also referenced as ring -2, i.e., it has more priviliges than the kernel (ring 0) or the hypervisor (ring -1). Actually, the SMM is used for energy mangement, e.g. fan control or sleep states, memory error handling, emulating nonexistent hardware, etc.
However, past experience has shown that it can be exploited for malicious issues [2, 3, 4].
Nevertheless, it would also be possible to leverage the power of the SMM for incident response, i.e., as a reliable memory dumper. Basically, the SMM code is written by the BIOS/UEFI. Afterwards, it should be locked that it is not possible to tamper SMM code from the kernel.
Goal of this work is to extend TianoCore (an open-source implementation of UEFI) by a forensic component. That forensic component should be used to setup and configure an SMM memory dumper.
1
2
3
4
5
- Vorausgesetzte Vorlesungen bzw. Kenntnisse:
- Interest in low level programming on x86. Basic Knowledge about the BIOS/UEFI. Willingness to incorporate into existing code projects like the Linux kernel.
- Schlagwörter:
- Forensics
- Bearbeitungszustand:
Die Arbeit ist bereits abgeschlossen. |
|
|
|
|
UnivIS ist ein Produkt der Config eG, Buckenhof |
|
|