One of the most common uses of Flash memory is for the basic input/output system of your computer, commonly known as the BIOS (pronounced "bye-ose"). On virtually every computer available, the BIOS makes sure all the other chips, hard drives, ports and CPU function together.
Every desktop and laptop computer in common use today contains a microprocessor as its central processing unit. The microprocessor is the hardware component. To get its work done, the microprocessor executes a set of instructions known as software (see How Microprocessors Work for details). You are probably very familiar with two different types of software:
- The operating system - The operating system provides a set of services for the applications running on your computer, and it also provides the fundamental user interface for your computer. Windows 98 and Linux are examples of operating systems. (See How Operating Systems Work for lots of details.)
- The applications - Applications are pieces of software that are programmed to perform specific tasks. On your computer right now you probably have a browser application, a word processing application, an e-mail application and so on. You can also buy new applications and install them.
It turns out that the BIOS is the third type of software your computer needs to operate successfully. In this article, you'll learn all about BIOS -- what it does, how to configure it and what to do if your BIOS needs updating.
Research on Malicious Behavior of Firmware Based on Hardware Resources Access Control
Authors: Le Kang Yang, Di Chen, Ju Mei, Liang Xue
Abstract: As same as the traditional application and system software, firmware also faced the risk of malicious code like hobbyhorse, back door, logical bomb and so on. Firmware exhibited strong cohesion and hardware relativity, which make the malicious action in firmware to be different from that in the traditional software. This paper analyzed the specificities of firmware and the malicious behaviour about it, then expatiate the essence of the malicious behaviour of the firmware, and presented a firmware formal definition and detecting method which was based on the hardware resources access control policy. Experimental results proved that the method was effective to detect the malicious firmware.
Analysis on Implementation Technology of Firmware Boot Sequence
Authors: Hai Fu Chen, Wei Min Wu, Dong Xin Chen, Wei De Chen, Qin Tong Cai
Abstract: Firmware is an important part of the computer architecture, the Firmware in the process of self-test can be set through selecting specific options to adjust the boot sequence menu list, allowing the computer to select the media type to start the operating system. In this paper,through the analysis of Firmware’s boot sequence principle, pointed out the process of implementation of the Firmware boot sequence, including the position of reading boot sequence data, get the signatures of boot sequence and other key technologies. The correctness of results of the boot sequence modification experimental has been proved.