|
此文章由 lingyang 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 lingyang 所有!转贴必须注明作者、出处和本声明,并保持内容完整
闷烧锅 发表于 2013-6-17 22:22 
后门的控制和使用都离不开通信和网络,网络通信离不开协议。每层的协议处理对应操作系统的代码和网络硬件 ...
我的水平实在很难讨论这个问题,
可以google以下,看起来CPU是起点。
Researchers at the University of Illinois at Urbana-Champaign have demonstrated how they could take total control of a user’s computer by altering the computer chip itself.
From ACM:
In this paper, we present the consequences on the security of operating systems and virtual machine monitors of the presence of a bug or a backdoor in x86 processors. We will not try to determine whether the backdoor threat is realistic or not, but we will assume that a bug or a backdoor exists and analyse the consequences on systems. We will show how it is possible for an attacker to implement a simple and generic CPU backdoor to be later able to bypass mandatory security mechanisms with very limited initial privileges. We will explain practical difficulties and show proof of concept schemes using a modified Qemu CPU emulator. Backdoors studied in this paper are all usable from the software level without any physical access to the hardware. |
评分
-
查看全部评分
|