A method and system for accelerating verification and analysis of SMM safety hazards

A technology of safety hazards and call relationships, applied in computer security devices, program control design, instruments, etc., can solve problems such as cumbersome process, lack of order, and poor order

Active Publication Date: 2021-02-09
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Externally run any code trusted by SMM through relevant attack channels, so that many super privileges under SMM can be used. To solve this security problem, technicians sometimes draw several possible solutions based on theoretical analysis based on the attack surface. For attack channels, it is necessary to plan the detailed attack process or steps under the attack channel, analyze and deliberate on the attack environment such as user input and the specific operation details of each step, and even trace the source of deviations in the implementation of the attack plan. The process is cumbersome and poorly organized, and there is a lack of a method that combines engineering practice with theoretical analysis to orderly and speed up the verification and analysis of SMM safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for accelerating verification and analysis of SMM safety hazards
  • A method and system for accelerating verification and analysis of SMM safety hazards

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047]In order to clearly illustrate the technical characteristics of this solution, the following describes the present invention in detail through specific implementations and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, the components and settings of specific examples are described below. In addition, the present invention may repeat reference numbers and / or letters in different examples. This repetition is for the purpose of simplification and clarity, and does not indicate the relationship between the various embodiments and / or settings discussed. It should be noted that the components illustrated in the drawings are not necessarily drawn to scale. The present invention omits descriptions of well-known components and processing techniques and processes to avoid unnecessarily limiting the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a kind of method and system of quickening verification and analysis SMM potential safety hazard, and the method comprises: deploying basic environment, obtaining and recording host computer environment information, obtaining the module composition diagram of visual bios source code calling relationship diagram, bios mirror image; Obtain the GUID identifier related to SMM, match the GUID related to SMM in the bios source code and the corresponding GUID in the bin image generated by compiling the source code; obtain the environment information of the virtual machine, set a breakpoint to capture the call stack information at runtime; Verify and analyze SMM security risks. The system includes: a deployment unit, a visualization unit, a debugging unit, a verification and analysis unit; the deployment unit is respectively connected with the visualization unit and the debugging unit; the verification and analysis unit is connected with the deployment unit, the visualization unit and the debugging unit. The method and system provide conditions for technicians to quickly locate SMM safety hazards, so as to propose safety improvement measures in a targeted manner.

Description

Technical field[0001]The invention relates to the field of computer security, in particular to a method and system for accelerating verification and analysis of SMM security risks.Background technique[0002]In the computer field, bios, as an indispensable firmware program for the firmware layer, is the first program executed after the computer is started, and provides the lowest and most direct hardware control for the computer. UEFI is a new generation of bios standard, which defines the interface specification between operating system and hardware platform firmware, and provides users with a convenient underlying development environment. There are many kinds of firmware in every system. When the system starts, the processor will execute the main system firmware, namely uefi bios. Most of the firmware only runs at startup, but it runs in parallel with the operating system in a special x86 mode, namely SMM.[0003]SMM (System Management Mode), the system management mode, is the most po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F8/61G06F9/455
CPCG06F8/63G06F9/45558G06F21/575
Inventor 王鹏
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products