Back to Results
First PageMeta Content
Computing / Unified Extensible Firmware Interface / Advanced Configuration and Power Interface / Rootkit / System Management Mode / Firmware / PCI configuration space / Option ROM / Booting / BIOS / System software / Computer hardware


Acquisition and Analysis of Compromised Firmware Using Memory Forensics Johannes Stüttgen, Stefan Voemel and Michael Denzel
Add to Reading List

Document Date: 2015-03-31 11:50:18


Open Document

File Size: 3,96 MB

Share Result on Facebook

City

Las Vegas / /

Company

TPM / X86 Firmware Technologies / Intel / /

Continent

Europe / /

Country

United States / /

Facility

wlWWhQ University of Erlangen-Nuernberg / wlWWhQ University of Erlangen-Nuernberg ACPI Rootkits / wlWWhQ University of Erlangen-Nuernberg ACPI / wlWWhQ University / wlWWhQ Operating System AML Code ACPI Tables Firmware Hardware University of Erlangen-Nuernberg BIOS/EFI Rootkits / Uwe Hermann University of Erlangen-Nuernberg Outline / /

IndustryTerm

power management / x86 systems / /

OperatingSystem

Microsoft Windows / /

Organization

University of Erlangen-Nuernberg ACPI Rootkits / Uwe Hermann University of Erlangen-Nuernberg Outline / University of Erlangen-Nuernberg / wlWWhQ Operating System AML Code ACPI Tables Firmware Hardware University of Erlangen-Nuernberg BIOS/EFI Rootkits / University of Erlangen-Nuernberg ACPI / University of Erlangen-Nuernberg PCI Option ROM Rootkits / /

Person

Johannes Stuettgen / Corey Kallenberg / /

Position

driver / /

Product

ROM / /

Technology

ROM chip / virtual machine / RAM / Dom / Operating System / ASL / Operating systems / signed updates ROM chip / /

URL

http /

SocialTag