Too young to be secure: Analysis of UEFI threats and vulnerabilities

Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In general, UEFI has many technical advantages over BIOS (pre-OS environment, boot and run-time services, CPU-independent drivers etc.) inclu...

Full description

Bibliographic Details
Main Authors: Vladimir Bashun, Anton Sergeev, Victor Minchenkov, Alexandr Yakovlev
Format: Article
Language:English
Published: FRUCT 2013-11-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://www.fruct.org/publications/fruct14/files/Bas_49.pdf
_version_ 1819141777370644480
author Vladimir Bashun
Anton Sergeev
Victor Minchenkov
Alexandr Yakovlev
author_facet Vladimir Bashun
Anton Sergeev
Victor Minchenkov
Alexandr Yakovlev
author_sort Vladimir Bashun
collection DOAJ
description Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In general, UEFI has many technical advantages over BIOS (pre-OS environment, boot and run-time services, CPU-independent drivers etc.) including also powerful security mechanisms (e.g. secure boot, update, etc.). They are aimed to provide platform integrity, be root of trust of security architecture, control all stages of boot process until it pass control to authenticated OS kernel. From the other side UEFI technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. The main goal of this research is to provide analysis of the UEFI security issues, find the point and source of the security problems and classify them. The paper describes the architectural and implementation troubles of UEFI which lead to threats, vulnerabilities and attacks. It also includes extensive review of the previous research activities in this area and the results of our own experiments. As the result of the work some recommendation about how to make this young technology more safe and secure are provided.
first_indexed 2024-12-22T11:59:50Z
format Article
id doaj.art-e746a33bceb94f9cb732931026b2cc4d
institution Directory Open Access Journal
issn 2305-7254
2343-0737
language English
last_indexed 2024-12-22T11:59:50Z
publishDate 2013-11-01
publisher FRUCT
record_format Article
series Proceedings of the XXth Conference of Open Innovations Association FRUCT
spelling doaj.art-e746a33bceb94f9cb732931026b2cc4d2022-12-21T18:26:40ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372013-11-0123214162410.1109/FRUCT.2013.6737940Too young to be secure: Analysis of UEFI threats and vulnerabilitiesVladimir Bashun0Anton Sergeev1Victor Minchenkov2Alexandr Yakovlev3St. Petersburg State University of Aerospace Instrumentation, St. Petersburg, RussiaSt. Petersburg State University of Aerospace Instrumentation, St. Petersburg, RussiaSt. Petersburg State University of Aerospace Instrumentation, St. Petersburg, RussiaSt. Petersburg State University of Aerospace Instrumentation, St. Petersburg, RussiaUnified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In general, UEFI has many technical advantages over BIOS (pre-OS environment, boot and run-time services, CPU-independent drivers etc.) including also powerful security mechanisms (e.g. secure boot, update, etc.). They are aimed to provide platform integrity, be root of trust of security architecture, control all stages of boot process until it pass control to authenticated OS kernel. From the other side UEFI technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. The main goal of this research is to provide analysis of the UEFI security issues, find the point and source of the security problems and classify them. The paper describes the architectural and implementation troubles of UEFI which lead to threats, vulnerabilities and attacks. It also includes extensive review of the previous research activities in this area and the results of our own experiments. As the result of the work some recommendation about how to make this young technology more safe and secure are provided.https://www.fruct.org/publications/fruct14/files/Bas_49.pdf UEFI Secure BootBoot firmwareBootkitRootkit
spellingShingle Vladimir Bashun
Anton Sergeev
Victor Minchenkov
Alexandr Yakovlev
Too young to be secure: Analysis of UEFI threats and vulnerabilities
Proceedings of the XXth Conference of Open Innovations Association FRUCT
UEFI Secure Boot
Boot firmware
Bootkit
Rootkit
title Too young to be secure: Analysis of UEFI threats and vulnerabilities
title_full Too young to be secure: Analysis of UEFI threats and vulnerabilities
title_fullStr Too young to be secure: Analysis of UEFI threats and vulnerabilities
title_full_unstemmed Too young to be secure: Analysis of UEFI threats and vulnerabilities
title_short Too young to be secure: Analysis of UEFI threats and vulnerabilities
title_sort too young to be secure analysis of uefi threats and vulnerabilities
topic UEFI Secure Boot
Boot firmware
Bootkit
Rootkit
url https://www.fruct.org/publications/fruct14/files/Bas_49.pdf
work_keys_str_mv AT vladimirbashun tooyoungtobesecureanalysisofuefithreatsandvulnerabilities
AT antonsergeev tooyoungtobesecureanalysisofuefithreatsandvulnerabilities
AT victorminchenkov tooyoungtobesecureanalysisofuefithreatsandvulnerabilities
AT alexandryakovlev tooyoungtobesecureanalysisofuefithreatsandvulnerabilities