Ronny Chevalier

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Highly privileged software, such as firmware, is an attractive target for attackers. Thus, BIOS vendors use cryptographic signatures to ensure firmware integrity at boot time. Nevertheless, such protection does not prevent an attacker from exploiting vulnerabilities at runtime. To detect such attacks, we propose an event-based behavior monitoring approach(More)
  • 1