CPU, making this a viable option to detect unautho-
rized modifications (Intel, 2013). Another way is the
use of the Intel Trusted Execution Technology (TXT)
which can be used with Intel’s open source bootloader
”tboot”. It should be noted that in order for TXT to
be secure, the use of Dual Monitor Mod (DMM) is
required because otherwise attackers might be able
to avoid detection by hiding in SMRAM (Kallenberg
and Kovah, 2015).
5 CONCLUSION
In this paper, we introduced LONGKIT, a novel frame-
work for BIOS/UEFI malware in the SMM which is
written entirely position-independent, fully supports
64-bit computers and is memory-layout aware for tar-
geted interaction with the operating systems kernel.
With the LONGKIT prototype we were able to show
the full potential of concealed malware in the SMM,
where most previous approaches were limited to sim-
ple proof-of-concept scenarios. By implementing two
typical rootkit functionalities (authentication bypass
and system call hooking), we demonstrated the effec-
tiveness of the LONGKIT framework in real-world ap-
plications. Furthermore, we discussed the stealthiness
of LONGKIT and possible ways of identifying future
SMM-based malware.
Based on our comprehensive research and the im-
plementation details provided, further investigation
into practical countermeasures of BIOS/UEFI mal-
ware becomes possible. In order to encourage fu-
ture research into malware and APT defense, all code
will be made available for researchers upon request.
Besides malware, LONGKIT provides many features
which are likely also useful for other SMM research.
The whole code being position independent makes it
very versatile and easily reusable in many different
scenarios. For example, LONGKIT could serve as a
foundation for the development of an open source al-
ternatives to the currently often closed source SMI
handlers provided by many manufacturers. At the
time of writing, the SMI handler used by SeaBIOS is
very minimal and LONGKIT could be used to develop
more sophisticated functionality.
ACKNOWLEDGEMENTS
The financial support by the Austrian Federal Min-
istry of Science, Research and Economy and the Na-
tional Foundation for Research, Technology and De-
velopment is gratefully acknowledged.
REFERENCES
Appelbaum, J., Horchert, J., and St
¨
ocker, C. (2013). Shop-
ping for spy gear: Catalog advertises nsa toolbox. (last
access: 9.8.2016).
Butterworth, J., Kallenberg, C., Kovah, X., and Herzog,
A. (2013). Bios chronomancy: Fixing the static core
root of trust for measurement. ACM Conference on
Computer and Communications Security, Berlin, Ger-
many.
Domas, C. (2015). The memory sinkhole - unleashing an
x86 design flaw allowing universal privilege escala-
tion. BlackHat, Las Vegas, USA.
Duflot, L., Etiemble, D., and Grumelard, O. (2006). Using
cpu system management mode to circumvent operat-
ing system security functions. CanSecWest, Vancou-
ver, Canada.
Duflot, L., Levillain, O., Morin, B., and Grumelard, O.
(2009). Getting into the smram: Smm reloaded.
CanSecWest, Vancouver, Canada.
Duflot, L., Levillain, O., Morin, B., and Grumelard, O.
(2010). System management mode design and secu-
rity issues. IT-DEFENSE, Br
¨
uhl, Germany.
Embleton, S. and Sparks, S. (2008). Smm rootkits. Se-
cureComm, Istanbul, Turkey.
Embleton, S., Sparks, S., and Zou, C. C. (2013). Smm
rootkit: a new breed of os independent malware. Se-
curity and Communication Networks.
Forristal, J. (2011). Hardware involved software attacks.
CanSecWest, Vancouver, Canada.
Intel (2013). Hardware-based security for intelligent retail
devices. (last access: 9.8.2016).
Intel (2016). Intel 64 and ia-32 architectures software de-
velopers manual.
Kallenberg, C. and Kovah, X. (2015). How many million
bioses would you like to infect. CanSecWest, Vancou-
ver, Canada.
Kallenberg, C., Kovah, X., Butterworth, J., and Cornwell,
S. (2014). Extreme privilege escalation on windows
8/uefi systems. BlackHat, Las Vegas, USA.
Kallenberg, C. and Wojtczuk, R. (2015). Speed racer:
Exploiting an intel flash protection race condition.
Bromium Labs.
Luh, R., Marschalek, S., Kaiser, M., Janicke, H., and Schrit-
twieser, S. (2016). Semantics-aware detection of tar-
geted attacks: a survey. Journal of Computer Virology
and Hacking Techniques.
Schiffman, J. and Kaplan, D. (2014). The smm rootkit re-
visited: Fun with usb. Availability, Reliability and Se-
curity (ARES), Fribourg, Switzerland.
Wojtczuk, R. and Kallenberg, C. (2014). Attacking uefi
boot script. 31st Chaos Communication Congress,
Hamburg, Germany.
Wojtczuk, R. and Rutkowska, J. (2009). Attacking smm
memory via intel cpu cache poisoning. Invisible
Things Lab.
LONGKIT – A Universal Framework for BIOS/UEFI Rootkits in System Management Mode
353