Bootjacker: compromising computers using forced restarts

EM Chan, JC Carlyle, FM David, R Farivar… - Proceedings of the 15th …, 2008 - dl.acm.org
EM Chan, JC Carlyle, FM David, R Farivar, RH Campbell
Proceedings of the 15th ACM conference on Computer and Communications Security, 2008dl.acm.org
BootJacker is a proof-of-concept attack tool which demonstrates that authentication
mechanisms employed by an operating system can be bypassed by obtaining physical
access and simply forcing a restart. The key insight that enables this attack is that the
contents of memory on some machines are fully preserved across a warm boot. Upon a
reboot, BootJacker uses this residual memory state to revive the original host operating
system environment and run malicious payloads. Using BootJacker, an attacker can break …
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and simply forcing a restart. The key insight that enables this attack is that the contents of memory on some machines are fully preserved across a warm boot. Upon a reboot, BootJacker uses this residual memory state to revive the original host operating system environment and run malicious payloads. Using BootJacker, an attacker can break into a locked user session and gain access to open encrypted disks, web browser sessions or other secure network connections. BootJacker's non-persistent design makes it possible for an attacker to leave no traces on the victim machine.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果