Nothing Special   »   [go: up one dir, main page]

Skip to main content

ACPI: Design Principles and Concerns

  • Conference paper
Trusted Computing (Trust 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5471))

Included in the following conference series:

Abstract

ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management tasks. These tasks used to be achieved by the BIOS because it was the only platform component to know which specific chipset or device registers dealt with power management. In this paper, we illustrate how this shift in the global power management model introduces additional threats, especially for trusted platforms, by showing how rootkits can use ACPI to conceal some of their functions. We also study the relationship between trusted computing blocks and ACPI.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ACPI Component Architecture. Unix format test suite (2008), http://www.acpica.org/downloads

  2. Devices, A.M.: Amd64 virtualization: Secure virtual machine architecture reference manual (2005)

    Google Scholar 

  3. Duflot, L., Etiemble, D., Grumelard, O.: Security Issues Related to Pentium System Management Mode. In: CanSecWest Security Conference Core 2006 (2006)

    Google Scholar 

  4. Embleton, S., Sparks, S.: The System Management Mode (SMM) Rootkit. In: Black Hat Briefings (2008)

    Google Scholar 

  5. Grawrock, D.: The intel safer computing initiative (2007)

    Google Scholar 

  6. Heasman, J.: Implementing and detecting an acpi bios rootkit. In: Blackhat federal 2006 (2006), www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Heasman.pdf

  7. Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.: Towards trustworthy computing systems: taking microkernel to the next level. In: ACM operating systems review (2007)

    Google Scholar 

  8. Hewlett-Packard: Intel, Microsoft, Phoenix, and Toshiba. The acpi specification: revision 3.0b (2008), http://www.acpi.info/spec.htm

  9. Intel Corp. Intel 82845 Memory Controller Hub (MCH) Datasheet (2002)

    Google Scholar 

  10. Intel Corp. Intel 64 and IA 32 Architectures Software Developer’s Manual Volume 1: Basic architecture (2007)

    Google Scholar 

  11. Intel Corp. Intel 64 and ia 32 architectures software developer’s manual volume 2a: instruction set reference, a-m (2007), http://www.intel.com/design/processor/manuals/253666.pdf

  12. Intel Corp. Intel 64 and IA 32 Architectures Software Developer’s Manual Volume 2B: Instruction Set Reference, N-Z (2007)

    Google Scholar 

  13. Intel Corp. Intel 64 and IA 32 Architectures Software Developer’s Manual Volume 3A: System Programming Guide Part 1 (2007)

    Google Scholar 

  14. Intel Corp. Intel I/O Controller Hub 9 (ICH9) Family Datasheet (2008)

    Google Scholar 

  15. Mandriva. Mandriva linux one (2008), http://www.mandriva.com/en/product/mandriva-linux-one

  16. Microsoft and Intel. Advanced power management v1.2 specification (1996), www.microsoft.com/whdc/archive/amp_12.mspx

  17. PCI-SIG. Pci local bus specification, revision 2.1. (1995)

    Google Scholar 

  18. Trusted Computing Group. Tpm specification version 1.2: Design principles (2008), https://www.trustedcomputinggroup.org/specs/TPM/MainP1DPrev103.zip

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Duflot, L., Levillain, O., Morin, B. (2009). ACPI: Design Principles and Concerns. In: Chen, L., Mitchell, C.J., Martin, A. (eds) Trusted Computing. Trust 2009. Lecture Notes in Computer Science, vol 5471. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00587-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00586-2

  • Online ISBN: 978-3-642-00587-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics