BIOS Disassembly Ninjutsu Uncovered
PDF
BIOS Disassembly Ninjutsu Uncovered

Explaining security vulnerabilities,possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitationdescribes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer defense—and the exploitation of embedded x86 BIOSare also covered.