作者: Vincent Zimmer , Lee Rosenbaum , John Loucaides , Oleksandr Bazhaniuk , Mark R. Tuttle
DOI:
关键词:
摘要: We are building a tool that uses symbolic execution to search for BIOS security vulnerabilities including dangerous memory references (call outs) by SMM interrupt handlers in UEFI-compliant implementations of BIOS. Our currently applies only variables. Given snapshot SMRAM, the base address and variable handler S2E run KLEE engine concrete examples call causes read outside SMRAM. This is work progress. discuss our approach, current status, plans tool, obstacles we face.