By Topic

Alien vs. Quine

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Graizer, V. ; Univ. Paris II ; Naccache, D.

Is it possible to prove that a computer is malware-free without pulling out its hard disk? This article introduces a novel hardware inspection technique based on the injection of carefully crafted code and the analysis of its output and execution time. In theory, the easiest way to exterminate malware is to reformat the disk and then reinstall the operating system (OS) from a trusted distribution GD. This procedure assumes we can force computers to boot from trusted media, but most modern PCs have a flash BIOS, which means that the code component in charge of booting is recorded on a rewritable memory chip. Specific programs called flashers - or even malware such as the CIH (Chernobyl) virus - have the ability to update this chip. This article addresses this concern, namely, ascertaining that malware doesn't re-flash the BIOS to derail disk-reformatting attempts or simulate their successful completion

Published in:

Security & Privacy, IEEE  (Volume:5 ,  Issue: 2 )