Subscribe
Issue No.05 - September/October (2010 vol.8)
pp: 14-19
Hui Jun Wu , Lenovo Limited(Beijing),
ABSTRACT
Authentication within the X86 CPU system management mode has significant benefits for system security because the entire process is conducted within a secure environment. So, authentication itself can be guaranteed to a much higher degree. The author proposes a mechanism that can be used to access cipher information from a software application image to check code integrity for security-sensitive code. This is achievable because system management code is top priority and "invisible" to the operating system.
INDEX TERMS
secure authentication, SMI, system management mode, secure BIOS, RSA
CITATION
Hui Jun Wu, "Kernel Service Protection for Client Security", IEEE Security & Privacy, vol.8, no. 5, pp. 14-19, September/October 2010, doi:10.1109/MSP.2010.112
REFERENCES
1. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 3B: System Programming Guide, Part 2, Intel, 2006, pp. 207, 211–213.
2. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 2B: Instruction Set Reference, N–Z, Intel, 2006, pp. 17, 267.
3. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 2A: Instruction Set Reference, A–M, Intel, 2006, p. 543.
4. Federal Information Processing Standards Publication 180-2, 1 Aug. 2002, p. 9.
5. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 3A: System Programming Guide, Part 1, Intel, 2006, pp. 63–70, 101.
6. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 1: Basic Architecture, Intel, 2006, pp. 72–73, 78.