Slide 26
Slide 26 text
References
• [0] https://uefi.org/sites/default/files/resources/UEFI_Spec_2_8_A_Feb14.pdf
• [1] B. Parno, J. M. McCune, and A. Perrig, “Bootstrapping trust in commodity
computers,” in IEEE Symposium on Security and Privacy, 2010, pp. 414–429.
• [2]A. Matrosov, E. Rodionov, and S. Bratus, “Rootkits and Bootkits”, No
Starch Press, 2019.
• [3] https://github.com/Cr4sh/SmmBackdoor
• [4] Y. Bulygin, J. Loucaides, A. Furtak, O.Bazhaniuk, and A. Matrosov,
“Summary of Attacks Against BIOS and Secure Boot,” DEF CON, 2014.