{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T05:09:46Z","timestamp":1770354586399,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,13]]},"DOI":"10.1145\/3292006.3300026","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:22:04Z","timestamp":1553170924000},"page":"315-325","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["BootKeeper"],"prefix":"10.1145","author":[{"given":"Ronny","family":"Chevalier","sequence":"first","affiliation":[{"name":"CentraleSup\u00e9lec, Inria, Univ Rennes, CNRS, IRISA, Rennes, France"}]},{"given":"Stefano","family":"Cristalli","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Christophe","family":"Hauser","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Yan","family":"Shoshitaishvili","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Ruoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Danilo","family":"Bruschi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Andrea","family":"Lanzi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"9th USENIXWorkshop on Offensive Technologies (WOOT '15)","author":"Bazhaniuk Oleksandr","year":"2015","unstructured":"Oleksandr Bazhaniuk , John Loucaides , Lee Rosenbaum , Mark R Tuttle , and Vincent Zimmer . 2015 . Symbolic execution for BIOS security . In 9th USENIXWorkshop on Offensive Technologies (WOOT '15) . Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R Tuttle, and Vincent Zimmer. 2015. Symbolic execution for BIOS security. In 9th USENIXWorkshop on Offensive Technologies (WOOT '15)."},{"key":"e_1_3_2_1_2_1","volume-title":"Las Vegas, USA","author":"Brossard Jonathan","year":"2012","unstructured":"Jonathan Brossard . 2012. Hardware backdooring is practical. BlackHat , Las Vegas, USA ( 2012 ). Jonathan Brossard. 2012. Hardware backdooring is practical. BlackHat, Las Vegas, USA (2012)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.47"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516714"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_6_1","unstructured":"University California Santa Barbara Computer Security Lab. {n. d.}. angr a binary analysis framework. https:\/\/angr.io\/ Accessed: 2018--11--30.  University California Santa Barbara Computer Security Lab. {n. d.}. angr a binary analysis framework. https:\/\/angr.io\/ Accessed: 2018--11--30."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Davidson Drew","year":"2013","unstructured":"Drew Davidson and Benjamin Moench . 2013 . FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution . In Proceedings of the USENIX Security Symposium. Drew Davidson and Benjamin Moench. 2013. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_8_1","unstructured":"F-Secure. {n. d.}. Virus:DOS\/CIH Description | F-Secure Labs. https:\/\/www. f-secure.com\/v-descs\/cih.shtml Accessed: 2018--11--30.  F-Secure. {n. d.}. Virus:DOS\/CIH Description | F-Secure Labs. https:\/\/www. f-secure.com\/v-descs\/cih.shtml Accessed: 2018--11--30."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"John Heasman. 2006. Implementing and detecting an ACPI BIOS rootkit. In Black Hat Europe.  John Heasman. 2006. Implementing and detecting an ACPI BIOS rootkit. In Black Hat Europe.","DOI":"10.1016\/S1353-4858(06)70326-9"},{"key":"e_1_3_2_1_10_1","unstructured":"John Heasman. 2007. Implementing and detecting a PCI rootkit. In Black Hat DC.  John Heasman. 2007. Implementing and detecting a PCI rootkit. In Black Hat DC."},{"key":"e_1_3_2_1_11_1","unstructured":"HP Inc. 2018. HP Sure Start. https:\/\/www8.hp.com\/h20195\/v2\/GetPDF.aspx\/ 4AA7--2197ENW.pdf Accessed: 2018--11--30.  HP Inc. 2018. HP Sure Start. https:\/\/www8.hp.com\/h20195\/v2\/GetPDF.aspx\/ 4AA7--2197ENW.pdf Accessed: 2018--11--30."},{"key":"e_1_3_2_1_12_1","unstructured":"Corey Kallenberg John Butterworth Xeno Kovah and C Cornwell. 2013. Defeating Signed BIOS Enforcement. (2013). EkoParty Buenos Aires.  Corey Kallenberg John Butterworth Xeno Kovah and C Cornwell. 2013. Defeating Signed BIOS Enforcement. (2013). EkoParty Buenos Aires."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Kauer Bernhard","year":"2007","unstructured":"Bernhard Kauer . 2007 . OSLO: Improving the Security of Trusted Computing . In Proceedings of the USENIX Security Symposium. Bernhard Kauer. 2007. OSLO: Improving the Security of Trusted Computing. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133958"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2003.1238038"},{"key":"e_1_3_2_1_16_1","volume-title":"Testing Closed-Source Binary Device Drivers with DDT. In USENIX Annual Technical Conference.","author":"Kuznetsov Volodymyr","year":"2010","unstructured":"Volodymyr Kuznetsov , Vitaly Chipounov , and George Candea . 2010 . Testing Closed-Source Binary Device Drivers with DDT. In USENIX Annual Technical Conference. Volodymyr Kuznetsov, Vitaly Chipounov, and George Candea. 2010. Testing Closed-Source Binary Device Drivers with DDT. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714639"},{"key":"e_1_3_2_1_18_1","unstructured":"Ge Livian. 2011. BIOS Threat is Showing up Again! https:\/\/www.symantec.com\/ connect\/blogs\/bios-threat-showing-again Accessed: 2018--11--30.  Ge Livian. 2011. BIOS Threat is Showing up Again! https:\/\/www.symantec.com\/ connect\/blogs\/bios-threat-showing-again Accessed: 2018--11--30."},{"key":"e_1_3_2_1_19_1","unstructured":"Alex Matrosov. 2017. Who Watch BIOS Watchers? https:\/\/medium.com\/ @matrosov\/bypass-intel-boot-guard-cc05edfca3a9 Accessed: 2018--11--30.  Alex Matrosov. 2017. Who Watch BIOS Watchers? https:\/\/medium.com\/ @matrosov\/bypass-intel-boot-guard-cc05edfca3a9 Accessed: 2018--11--30."},{"key":"e_1_3_2_1_20_1","unstructured":"Kevin O'Connor. {n. d.}. SeaBIOS. https:\/\/www.seabios.org\/SeaBIOS Accessed: 2018--11--30.  Kevin O'Connor. {n. d.}. SeaBIOS. https:\/\/www.seabios.org\/SeaBIOS Accessed: 2018--11--30."},{"key":"e_1_3_2_1_21_1","unstructured":"OpenSSL Foundation Inc. {n. d.}. OpenSSL. https:\/\/www.openssl.org\/ Accessed: 2018--11--30.  OpenSSL Foundation Inc. {n. d.}. OpenSSL. https:\/\/www.openssl.org\/ Accessed: 2018--11--30."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_23_1","first-page":"143","article-title":"Boot with Integrity, or Don't Boot. In Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine. Apress, Berkeley, CA, USA","volume":"6","author":"Ruan Xiaoyu","year":"2014","unstructured":"Xiaoyu Ruan . 2014 . Boot with Integrity, or Don't Boot. In Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine. Apress, Berkeley, CA, USA , Chapter 6 , 143 -- 163 . Xiaoyu Ruan. 2014. Boot with Integrity, or Don't Boot. In Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine. Apress, Berkeley, CA, USA, Chapter 6, 143--163.","journal-title":"Chapter"},{"key":"e_1_3_2_1_24_1","volume-title":"CanSecWest Applied Security Conference.","author":"Sacco Anibal L","year":"2009","unstructured":"Anibal L Sacco and Alfredo A Ortega . 2009 . Persistent BIOS infection . In CanSecWest Applied Security Conference. Anibal L Sacco and Alfredo A Ortega. 2009. Persistent BIOS infection. In CanSecWest Applied Security Conference."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179487"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.005"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Network and Distributed System and Security symposium (NDSS).","author":"Sharif Monirul","year":"2008","unstructured":"Monirul Sharif , Andrea Lanzi , Jonathon Giffin , and Wenke Lee . 2008 . Impeding Malware Analysis Using Conditional Code Obfuscation . In Proceedings of the Network and Distributed System and Security symposium (NDSS). Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke Lee. 2008. Impeding Malware Analysis Using Conditional Code Obfuscation. In Proceedings of the Network and Distributed System and Security symposium (NDSS)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_1_29_1","volume-title":"IEEE Symposium on Security and Privacy. 138--157","author":"Shoshitaishvili Yan","year":"2015","unstructured":"Yan Shoshitaishvili , RuoyuWang, Christopher Salls , Nick Stephens , Mario Polino , Andrew Dutcher , John Grosen , Siji Feng , Christophe Hauser , Christopher Kruegel , and Giovanni Vigna . 2015 . SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis . In IEEE Symposium on Security and Privacy. 138--157 . Yan Shoshitaishvili, RuoyuWang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2015. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In IEEE Symposium on Security and Privacy. 138--157."},{"key":"e_1_3_2_1_30_1","unstructured":"The TianoCore Community. {n. d.}. EDK II. https:\/\/github.com\/tianocore\/ tianocore.github.io\/wiki\/EDK-II Accessed: 2018--11--30.  The TianoCore Community. {n. d.}. EDK II. https:\/\/github.com\/tianocore\/ tianocore.github.io\/wiki\/EDK-II Accessed: 2018--11--30."},{"key":"e_1_3_2_1_31_1","volume-title":"PC Client Specific Implementation Specification for Conventional BIOS. Trusted Computing Group.","author":"Trusted Computing Group","year":"2005","unstructured":"Trusted Computing Group 2005 . PC Client Specific Implementation Specification for Conventional BIOS. Trusted Computing Group. Trusted Computing Group 2005. PC Client Specific Implementation Specification for Conventional BIOS. Trusted Computing Group."},{"key":"e_1_3_2_1_32_1","volume-title":"PC Client Specific-TPM Interface Specification","author":"Trusted Computing Group 2005.","unstructured":"Trusted Computing Group 2005. PC Client Specific-TPM Interface Specification . Trusted Computing Group . Trusted Computing Group 2005. PC Client Specific-TPM Interface Specification. Trusted Computing Group."},{"key":"e_1_3_2_1_33_1","volume-title":"Part 1 Design Principles","author":"Trusted Computing Group 2011. TPM Main","unstructured":"Trusted Computing Group 2011. TPM Main , Part 1 Design Principles . Trusted Computing Group . Trusted Computing Group 2011. TPM Main, Part 1 Design Principles. Trusted Computing Group."},{"key":"e_1_3_2_1_34_1","volume-title":"EFI Platform Specification","author":"Trusted Computing Group 2014.","unstructured":"Trusted Computing Group 2014. EFI Platform Specification . Trusted Computing Group . Trusted Computing Group 2014. EFI Platform Specification. Trusted Computing Group."},{"key":"e_1_3_2_1_35_1","unstructured":"UEFI Forum 2017. UEFI Platform Initialization Specification (version 1.6 ed.). UEFI Forum.  UEFI Forum 2017. UEFI Platform Initialization Specification (version 1.6 ed.). UEFI Forum."},{"key":"e_1_3_2_1_36_1","unstructured":"UEFI Forum. 2017. Unified Extensible Firmware Interface Specification. Version 2.7.  UEFI Forum. 2017. Unified Extensible Firmware Interface Specification. Version 2.7."},{"key":"e_1_3_2_1_37_1","volume-title":"Attacking Intel BIOS. (July","author":"Wojtczuk Rafal","year":"2009","unstructured":"Rafal Wojtczuk and Alexander Tereshkin . 2009. Attacking Intel BIOS. (July 2009 ). Black Hat USA. Rafal Wojtczuk and Alexander Tereshkin. 2009. Attacking Intel BIOS. (July 2009). Black Hat USA."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813663"},{"key":"e_1_3_2_1_39_1","volume-title":"AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.. In NDSS.","author":"Zaddach Jonas","year":"2014","unstructured":"Jonas Zaddach , Luca Bruno , Aurelien Francillon , and Davide Balzarotti . 2014 . AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.. In NDSS. Jonas Zaddach, Luca Bruno, Aurelien Francillon, and Davide Balzarotti. 2014. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.. In NDSS."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"e_1_3_2_1_41_1","volume-title":"Trusted Platforms: UEFI, PI, and TCG-based firmware. Technical Report. Intel and IBM.","author":"Zimmer Shiva Dasari","year":"2009","unstructured":"Shiva Dasari Zimmer , SR Dasari , and SP Brogan . 2009 . Trusted Platforms: UEFI, PI, and TCG-based firmware. Technical Report. Intel and IBM. Shiva Dasari Zimmer, SR Dasari, and SP Brogan. 2009. Trusted Platforms: UEFI, PI, and TCG-based firmware. Technical Report. Intel and IBM."},{"key":"e_1_3_2_1_42_1","volume-title":"Beyond BIOS: developing with the unified extensible firmware interface","author":"Zimmer Vincent","unstructured":"Vincent Zimmer , Michael Rothman , and Suresh Marisetty . 2010. Beyond BIOS: developing with the unified extensible firmware interface . Intel Press . Vincent Zimmer, Michael Rothman, and Suresh Marisetty. 2010. Beyond BIOS: developing with the unified extensible firmware interface. Intel Press."}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","location":"Richardson Texas USA","acronym":"CODASPY '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292006.3300026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:02Z","timestamp":1750208522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300026"}},"subtitle":["Validating Software Integrity Properties on Boot Firmware Images"],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":42,"alternative-id":["10.1145\/3292006.3300026","10.1145\/3292006"],"URL":"https:\/\/doi.org\/10.1145\/3292006.3300026","relation":{},"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"2019-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}