???jsp.layout.header-default.alt??? ???jsp.wrn.button.text??? ???jsp.wrn.button.alt???
  
 

University of South Wales DSpace >
University of South Wales >
Advanced Technology >
Computer Science >

???jsp.display-item.identifier??? http://hdl.handle.net/10265/496

???metadata.dc.title???: Malware and steganography in hard disk firmware
???metadata.dc.contributor.*???: Sutherland, Iain
Blyth, Andrew J.
???metadata.dc.date.issued???: 1-May-2012
???metadata.dc.identifier.citation???: Sutherland, I., Davies, G. and Blyth, A. (2) 'Malware and steganography in hard disk firmware', Journal in Computer Virology, 7(3), pp: 215-219.
???metadata.dc.description.abstract???: The hard disk drive remains the most commonly used form of storage media in both commercial and domestic computer systems. These drives can contain a vast range of data both of personal value and commercial significance. This paper focuses on two key areas; the potential for the drive operation to be impacted by malicious software and the possibility for the drive firmware to be manipulated to enable a form of steganography. Hard drive firmware is required for the correct operation of the disk drive in particular for dealing with errors arising due to natural wear as the drive ages. Where an area of the drive becomes unreliable due to wear and tear, the disk firmware which monitors the reliability of data access will copy the data from the failing area to a specially designated reserved area. The firmware remaps this data shift so the old data area and the original copy of the data are no longer accessible by the computer operating system. There are now a small number of commercially available devices, intended for data recovery, which can be used to modify the hard drive firmware components. This functionality can be used to conceal code on the disk drive, either as a form of steganography or to potentially include malicious code with the intention to infect or damage software or possibly system hardware. This paper discusses the potential problem generated by firmware being manipulated for malicious purposes.
???metadata.dc.identifier.uri???: http://hdl.handle.net/10265/496
???org.dspace.app.webui.jsptag.ItemTag.appears???Computer Science

???org.dspace.app.webui.jsptag.ItemTag.files???

???org.dspace.app.webui.jsptag.ItemTag.files.no???



???jsp.display-item.copyright???

 

Valid XHTML 1.0! ???jsp.layout.footer-default.text??? - ???jsp.layout.footer-default.feedback???