{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:06:40Z","timestamp":1763968000902},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,11,25]],"date-time":"2009-11-25T00:00:00Z","timestamp":1259107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s11416-009-0138-0","type":"journal-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T21:51:28Z","timestamp":1259099488000},"page":"353-374","source":"Crossref","is-referenced-by-count":3,"title":["ACPI and SMI handlers: some limits to trusted computing"],"prefix":"10.1007","volume":"6","author":[{"given":"Lo\u00efc","family":"Duflot","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Grumelard","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Levillain","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Morin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,11,25]]},"reference":[{"key":"138_CR1","unstructured":"ACPI Component Architecture. Unix format test suite. http:\/\/www.acpica.org\/downloads (2008)"},{"key":"138_CR2","unstructured":"Advanced Micro Devices AMD64 virtualization: secure virtual machine architecture reference manual (2005)"},{"key":"138_CR3","unstructured":"BSDDaemon, coideloko, and D0nAnd0n. System management mode hack: Using smm for other purposes. In: Phrack Magazine. http:\/\/www.phrack.org\/issues.html?issue=65&id=7#article (2008)"},{"key":"138_CR4","volume-title":"Insane Detection of Insane Rootkits: Chipset-Based Approach to Detect Virtualization","author":"Y. Bulygin","year":"2008","unstructured":"Bulygin Y.: Insane Detection of Insane Rootkits: Chipset-Based Approach to Detect Virtualization. Blackhat Briefings, USA (2008)"},{"key":"138_CR5","unstructured":"Duflot, L., Etiemble, D., Grumelard, O.: Security issues related to Pentium system management mode. In: CanSecWest Security Conference Core06. http:\/\/www.cansecwest.com\/slides06\/csw06-duflot.ppt (2006)"},{"key":"138_CR6","doi-asserted-by":"crossref","unstructured":"Embleton, S., Sparks, S., Zou, C.: Smm rootkits: a new breed of os independent malware. In: Proceedings of 4th International Conference on Security and Privacy in Communication Networks (SecureComm) (2008)","DOI":"10.1145\/1460877.1460892"},{"key":"138_CR7","volume-title":"The system management mode (smm) rootkit","author":"S. Embleton","year":"2008","unstructured":"Embleton S., Sparks S.: The system management mode (smm) rootkit. BlackHat Briefings, USA (2008)"},{"key":"138_CR8","volume-title":"The Intel Safer Computing Initiative: Building Blocks for Trusted Computing","author":"D. Grawrock","year":"2006","unstructured":"Grawrock D.: The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Intel Press, Oregon (2006)"},{"key":"138_CR9","doi-asserted-by":"crossref","unstructured":"Heasman, J.: Implementing and detecting an acpi bios rootkit. In: Blackhat Federal 2006. http:\/\/www.blackhat.com\/presentations\/bh-federal-06\/BH-Fed-06-Heasman.pdf (2006)","DOI":"10.1016\/S1353-4858(06)70326-9"},{"key":"138_CR10","doi-asserted-by":"crossref","unstructured":"Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.: Towards trustworthy computing systems: taking microkernels to the next level. In: ACM SIGOPS Operating Systems Review (2007)","DOI":"10.1145\/1278901.1278904"},{"key":"138_CR11","unstructured":"Hewlett Packard, Intel, Microsoft, Phoenix, and Toshiba. The acpi specification: revision 3.0b. http:\/\/www.acpi.info\/spec.htm (2008)"},{"key":"138_CR12","unstructured":"Intel Corp. Intel 82845 memory controller hub (mch) datasheet. http:\/\/www.intel.com\/design\/chipsets\/datashts\/290725.htm (2002)"},{"key":"138_CR13","unstructured":"Intel Corp. Intel 82801eb i\/o controller hub 5 (ich5) and intel 82801er i\/o controller hub 5 r (ich5r) datasheet. http:\/\/www.intel.com\/design\/chipsets\/datashts\/252516.htm (2003)"},{"key":"138_CR14","unstructured":"Intel Corp. Intel 64 and ia 32 architectures software developer\u2019s manual volume 1: basic architecture. http:\/\/www.intel.com\/design\/processor\/manuals\/253665.pdf (2007)"},{"key":"138_CR15","unstructured":"Intel Corp. Intel 64 and ia 32 architectures software developer\u2019s manual volume 2a: instruction set reference, a-m. http:\/\/www.intel.com\/design\/processor\/manuals\/253666.pdf (2007)"},{"key":"138_CR16","unstructured":"Intel Corp. Intel 64 and ia 32 architectures software developer\u2019s manual volume 2b: instruction set reference, n-z. http:\/\/www.intel.com\/design\/processor\/manuals\/253667.pdf (2007)"},{"key":"138_CR17","unstructured":"Intel Corp. Intel 64 and ia 32 architectures software developer\u2019s manual volume 3a: system programming guide part 1. http:\/\/www.intel.com\/design\/processor\/manuals\/253668.pdf (2007)"},{"key":"138_CR18","unstructured":"Intel Corp. Intel 64 and ia 32 architectures software developer\u2019s manual volume 3b: system programming guide part 2. http:\/\/www.intel.com\/design\/processor\/manuals\/253669.pdf (2007)"},{"key":"138_CR19","unstructured":"Intel Corp. Intel i\/o controller hub 9 (ich9) family datasheet. http:\/\/www.intel.com\/Assets\/PDF\/datasheet\/316972.pdf (2008)"},{"key":"138_CR20","unstructured":"Ivanlef0u. Smm. http:\/\/www.ivanlef0u.tuxfamily.org\/?p=138 (2008)"},{"key":"138_CR21","unstructured":"Mandriva. Mandriva linux one. http:\/\/www.mandriva.com\/en\/product\/mandriva-linux-one (2008)"},{"key":"138_CR22","unstructured":"Moore, R.: Why acpi is in the kernel, notes from 2001, 2001\u20132004. http:\/\/linux.derkeiler.com\/Mailing-Lists\/Kernel\/2004-10\/9399.html"},{"key":"138_CR23","unstructured":"Petroni, N. Jr, Fraser, T., Walters, A., Arbaugh, W.: An architecture for specification-based detection of semantic integrity violations in kernel dynamix data. In: Usenix Security 2006: Proceedings of the 15th Usenix Security Symposium (2006)"},{"key":"138_CR24","unstructured":"PCI-SIG. Pci local bus specification, revision 2.1 (1995)"},{"key":"138_CR25","volume-title":"Preventing and Detecting xen Hypervisor Subversions","author":"J. Rutkowska","year":"2008","unstructured":"Rutkowska J., Wojtczuk R.: Preventing and Detecting xen Hypervisor Subversions. Blackhat Briefings, USA (2008)"},{"key":"138_CR26","unstructured":"Steinberg, U., Kauer, B.: Hypervisor-based platform virtualization. http:\/\/os.inf-tu.dresden.de\/EZAG\/abstracts\/abstract_20080425.xml (2008)"},{"key":"138_CR27","unstructured":"Trusted Computing Group. About the trusted computing group. https:\/\/www.trustedcomputinggroup.org (2007)"},{"key":"138_CR28","unstructured":"Trusted Computing Group. Tpm specification version 1.2: Design principles. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/MainP1DPrev103.zip (2008)"},{"key":"138_CR29","unstructured":"UEFI. Unified extensible firmware interface. http:\/\/www.uefi.org\/home (2008)"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-009-0138-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-009-0138-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-009-0138-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:45:43Z","timestamp":1559400343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-009-0138-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,25]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["138"],"URL":"https:\/\/doi.org\/10.1007\/s11416-009-0138-0","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11,25]]}}}