Forensic analysis of BIOS chips

0Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Data can be hidden in BIOS chips without hindering computer performance. This feature has been exploited by virus writers and computer game enthusiasts. Unused BIOS storage can also be used by criminals, terrorists and intelligence agents to conceal secrets. However, BIOS chips are largely ignored in digital forensic investigations. Few techniques exist for imaging BIOS chips and no tools are available specifically for analyzing BIOS data. This paper focuses on the Award BIOS chip, which is commonly used in IBM compatible machines. It demonstrates how data may be concealed within BIOS free space and modules in a manner that makes it accessible using operating system commands. Furthermore, forensically sound techniques are described for detecting and recovering concealed data from BIOS chips.

References Powered by Scopus

Extracting concealed data from BIOS chips

5Citations
N/AReaders
Get full text

Implementing Downloadable Firmware With Flash Memory. A Microprogrammer-based approach to firmware updates.

3Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Gershteyn, P., Davis, M., & Shenoi, S. (2006). Forensic analysis of BIOS chips. IFIP International Federation for Information Processing, 222, 301–314. https://doi.org/10.1007/0-387-36891-4_24

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

75%

Professor / Associate Prof. 1

13%

Lecturer / Post doc 1

13%

Readers' Discipline

Tooltip

Computer Science 10

91%

Chemistry 1

9%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 2

Save time finding and organizing research with Mendeley

Sign up for free