ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management tasks. These tasks used to be achieved by the BIOS because it was the only platform component to know which specific chipset or device registers dealt with power management. In this paper, we illustrate how this shift in the global power management model introduces additional threats, especially for trusted platforms, by showing how rootkits can use ACPI to conceal some of their functions. We also study the relationship between trusted computing blocks and ACPI. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
Duflot, L., Levillain, O., & Morin, B. (2009). Acpi: Design principles and concerns. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5471 LNCS, pp. 14–28). https://doi.org/10.1007/978-3-642-00587-9_2
Mendeley helps you to discover research relevant for your work.