@inproceedings{c4aa06e309be44ad98a445a7643b0176,
title = "Acpi: Design principles and concerns",
abstract = "ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management tasks. These tasks used to be achieved by the BIOS because it was the only platform component to know which specific chipset or device registers dealt with power management. In this paper, we illustrate how this shift in the global power management model introduces additional threats, especially for trusted platforms, by showing how rootkits can use ACPI to conceal some of their functions. We also study the relationship between trusted computing blocks and ACPI.",
keywords = "ACPI, Rootkits, Trusted platforms",
author = "Lo{\"i}c Duflot and Olivier Levillain and Benjamin Morin",
year = "2009",
month = nov,
day = "9",
doi = "10.1007/978-3-642-00587-9\_2",
language = "English",
isbn = "3642005861",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "14--28",
booktitle = "Trusted Computing - Second International Conference, Trust 2009, Proceedings",
note = "2nd International Conference on Trusted Computing, Trust 2009 ; Conference date: 06-04-2009 Through 08-04-2009",
}