UEFI virtual machine firmware hardening through snapshots and attack surface reduction

11/19/2021
by   Mikhail Krichanov, et al.
0

The Unified Extensible Firmware Interface (UEFI) is a standardised interface between the firmware and the operating system used in all x86-based platforms over the past ten years. A side effect of the transition from conventional BIOS implementations to more complex and flexible implementations based on the UEFI was that it became easier for the malware to target BIOS in a widespread fashion, as these BIOS implementations are based on a common specification. This paper introduces Amaranth project - a solution to some of the contemporary security issues related to UEFI firmware. In this work we focused our attention on virtual machines as it allowed us to simplify the development of secure UEFI firmware. Security hardening of our firmware is achieved through several techniques, the most important of which are an operating system integrity checking mechanism (through snapshots) and overall firmware size reduction.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/10/2020

Securing the EDK II Image Loader

The Unified Extensible Firmware Interface (UEFI) is a standardised inter...
research
03/26/2023

Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices

The metaverse has gained significant attention from various industries d...
research
06/20/2020

Seq2Seq and Joint Learning Based Unix Command Line Prediction System

Despite being an open-source operating system pioneered in the early 90s...
research
10/19/2021

Java Card Virtual Machine Memory Organization: a Design Proposal

The Java Card Virtual Machine (JCVM) platform is widely deployed on secu...
research
10/19/2020

Dos and Don'ts of Machine Learning in Computer Security

With the growing processing power of computing systems and the increasin...
research
11/08/2019

Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments

Social Virtual Reality Learning Environment (VRLE) is a novel edge compu...
research
03/05/2014

A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

We present a taxonomy and an algebra for attack patterns on component-ba...

Please sign up or login with your details

Forgot password? Click here to reset