Abstract
ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management tasks. These tasks used to be achieved by the BIOS because it was the only platform component to know which specific chipset or device registers dealt with power management. In this paper, we illustrate how this shift in the global power management model introduces additional threats, especially for trusted platforms, by showing how rootkits can use ACPI to conceal some of their functions. We also study the relationship between trusted computing blocks and ACPI.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ACPI Component Architecture. Unix format test suite (2008), http://www.acpica.org/downloads
Devices, A.M.: Amd64 virtualization: Secure virtual machine architecture reference manual (2005)
Duflot, L., Etiemble, D., Grumelard, O.: Security Issues Related to Pentium System Management Mode. In: CanSecWest Security Conference Core 2006 (2006)
Embleton, S., Sparks, S.: The System Management Mode (SMM) Rootkit. In: Black Hat Briefings (2008)
Grawrock, D.: The intel safer computing initiative (2007)
Heasman, J.: Implementing and detecting an acpi bios rootkit. In: Blackhat federal 2006 (2006), www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Heasman.pdf
Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.: Towards trustworthy computing systems: taking microkernel to the next level. In: ACM operating systems review (2007)
Hewlett-Packard: Intel, Microsoft, Phoenix, and Toshiba. The acpi specification: revision 3.0b (2008), http://www.acpi.info/spec.htm
Intel Corp. Intel 82845 Memory Controller Hub (MCH) Datasheet (2002)
Intel Corp. Intel 64 and IA 32 Architectures Software Developer’s Manual Volume 1: Basic architecture (2007)
Intel Corp. Intel 64 and ia 32 architectures software developer’s manual volume 2a: instruction set reference, a-m (2007), http://www.intel.com/design/processor/manuals/253666.pdf
Intel Corp. Intel 64 and IA 32 Architectures Software Developer’s Manual Volume 2B: Instruction Set Reference, N-Z (2007)
Intel Corp. Intel 64 and IA 32 Architectures Software Developer’s Manual Volume 3A: System Programming Guide Part 1 (2007)
Intel Corp. Intel I/O Controller Hub 9 (ICH9) Family Datasheet (2008)
Mandriva. Mandriva linux one (2008), http://www.mandriva.com/en/product/mandriva-linux-one
Microsoft and Intel. Advanced power management v1.2 specification (1996), www.microsoft.com/whdc/archive/amp_12.mspx
PCI-SIG. Pci local bus specification, revision 2.1. (1995)
Trusted Computing Group. Tpm specification version 1.2: Design principles (2008), https://www.trustedcomputinggroup.org/specs/TPM/MainP1DPrev103.zip
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Duflot, L., Levillain, O., Morin, B. (2009). ACPI: Design Principles and Concerns. In: Chen, L., Mitchell, C.J., Martin, A. (eds) Trusted Computing. Trust 2009. Lecture Notes in Computer Science, vol 5471. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-00587-9_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00586-2
Online ISBN: 978-3-642-00587-9
eBook Packages: Computer ScienceComputer Science (R0)