Affiliation:
1. School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China
2. School of Cyberspace Science & Technology, Beijing Institute of Technology, Beijing 100081, China
Abstract
The Unified Extensible Firmware Interface (UEFI) provides a specification of the software interface between an OS and its underlying platform firmware. UEFI UI is an interactive interface that allows users to configure and manage UEFI settings, which is closely related to HII (Human Interface Infrastructure). In practice, HII provides a mechanism that allows developers to create UI elements with HII-related protocols. In this paper, we provide a comprehensive analysis of the UEFI combined with a case study. We proposed a protocol-centered static analysis method to obtain UEFI’s password policy, using HII-related protocols to find password implementation. Existing static analyses are ineffective in detecting such password policy in stripped UEFI firmware images. By reverse-engineering the IFR (Internal Forms Representation) in HII, we located where much sensitive information is stored. Lastly, we studied hardware port configurations, using Secure Boot as a case in point. We analyzed how UEFI uses the HII protocol to set relevant information in the UEFI UI. This paper is the first to offer a reverse-engineering systematic analysis of exploring UEFI via HII, providing valuable insights into its structure and potential enhancements for firmware security.
Funder
the National Natural Science Foundation of China
the China National Key Research and Development Program
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference41 articles.
1. (2023, October 08). UEFI Specification. Available online: https://uefi.org/specifications.
2. Zimmer, V., Rothman, M., and Marisetty, S. (2017). Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Walter de Gruyter GmbH & Co KG.
3. Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts;Jeong;Digit. Investig.,2019
4. Butterworth, J., Kallenberg, C., Kovah, X., and Herzog, A. (2013, January 4–8). Bios chronomancy: Fixing the core root of trust for measurement. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.
5. Sutherland, J.A. (2019). On Improving Cybersecurity Through Memory Isolation Using Systems Management Mode. [Ph.D. Thesis, Abertay University].