{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:10:20Z","timestamp":1773655820044,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080224","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"865-869","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers"],"prefix":"10.3103","volume":"53","author":[{"given":"I. D.","family":"Pankov","sequence":"first","affiliation":[]},{"given":"A. S.","family":"Konoplev","sequence":"additional","affiliation":[]},{"given":"A. Yu.","family":"Chernov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7189_CR1","unstructured":"Ermolov, A., Bypassing Intel Boot Guard, 2017. https:\/\/embedi.com\/blog\/bypassing-intel-boot-guard."},{"key":"7189_CR2","unstructured":"Ververis, V., Security Evaluation of Intel\u2019s Active Management Technology, 2010. https:\/\/people.kth.se\/~maguire\/ DEGREE-PROJECT-REPORTS\/100402-Vassilios_Ververis-with-cover.pdf."},{"key":"7189_CR3","unstructured":"Wojtczuk, R. and Tereshkin, A., Introducing Ring -3 Rootkits, 2009. https:\/\/invisiblethingslab.com\/resources\/ bh09usa\/Ring%20-3%20Rootkits.pdf."},{"key":"7189_CR4","unstructured":"Ermolov, M. and Goryachy, M., How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel ME, 2018. http:\/\/blog.ptsecurity.com\/2018\/01\/running-unsigned-code-in-intel-me.html."},{"key":"7189_CR5","unstructured":"Sklyarov, D., Intel ME 11.x Firmware Images Unpacker. https:\/\/github.com\/ptresearch\/unME11."},{"key":"7189_CR6","unstructured":"Sklyarov, D., Intel ME 12.x Firmware Images Unpacker. https:\/\/github.com\/ptresearch\/unME12."},{"key":"7189_CR7","unstructured":"Skochinsky, I., Rootkit in your laptop: Hidden code in your chipset and how to discover what exactly it does, 2012. http:\/\/me.bios.io\/images\/c\/ca\/Rootkit_in_your_laptop.pdf."},{"key":"7189_CR8","unstructured":"Ermolov, A., Schr\u00f6dinger Trusted Boot Intel Boot Guard, 2017. https:\/\/dsec.ru\/wp-content\/uploads\/pdf-dsec-old\/."},{"key":"7189_CR9","unstructured":"Ermolov, M. and Goryachy, M., Disabling Intel ME 11 via undocumented mode, 2017. https:\/\/www.ptsecurity.com\/ upload\/corporate\/ww-en\/analytics\/Intel-ME-disable-eng.pdf."},{"key":"7189_CR10","unstructured":"Kallenberg, C. and Wojtczuk, R., Speed Racer: Exploiting an Intel Flash Protection Race Condition. http:\/\/composter.com.ua\/documents\/Exploiting_Flash_Protection_Race_Condition.pdf."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080224.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080224","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080224.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:56:59Z","timestamp":1773611819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7189"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080224","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"10 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}