A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Co-processor-based Behavior Monitoring
2017
Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017
Highly privileged software, such as firmware, is an attractive target for attackers. Thus, BIOS vendors use cryptographic signatures to ensure firmware integrity at boot time. Nevertheless, such protection does not prevent an attacker from exploiting vulnerabilities at runtime. To detect such attacks, we propose an event-based behavior monitoring approach that relies on an isolated co-processor. We instrument the code executed on the main CPU to send information about its behavior to the
doi:10.1145/3134600.3134622
dblp:conf/acsac/ChevalierVPH17
fatcat:jizvvr647rgmpfbvc7xp7x7rsu