Chapter 32: Introduction to Vulnerabilities Below the Operating System
Abstract
This chapter spotlights the domain of vulnerabilities below the operating system (VBOS). Much of cybersecurity focuses on areas higher in the technology stack, but the foundational firmware layer in our devices presents unique cyber threats. Moving past the traditional analysis of memory, disk, logs, and network traffic, we identify strategies to gain visibility into these beneath-the-OS layers and the data that is needed even to have a chance to detect a firmware attack. Real-world examples like the Stuxnet attack highlight the importance of this topic. Understanding and addressing VBOS threats has never ...
Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.