scispace - formally typeset
Search or ask a question

How to Check System hardware information like BIOS version vendor? 

Answers from top 9 papers

More filters
Papers (9)Insight
Open accessProceedings ArticleDOI
17 Apr 2017
27 Citations
They provide access to information on hardware resource usage and can therefore be used to detect performance bottlenecks.
Proceedings ArticleDOI
Clark L. Coleman, Jack W. Davidson 
04 Nov 2001
18 Citations
Automatic determination of memory hierarchy parameters is shown to be superior to reliance on vendor data.
It enables system-level descriptions of SoCs: the same language is used for the description of the architecture, software and hardware parts. A tool like Pinapa is compulsory to work on realistic SoCs designs for anything else than simulation: it is able to extract both architecture and behavior information from SystemC code, with very few limitations.
However, side-channel information from hardware performance and timing can also be used for identification.
Proceedings ArticleDOI
Zhenliu Zhou, Haoli Luan, Bo Li, Shidong Zhu 
30 Sep 2010
2 Citations
An implementation of legacy BIOS Trojan is demonstrated to attest that planting malicious codes into legacy BIOS, which can be executed during runtime of BIOS and OS, is feasible.
Proceedings ArticleDOI
Zhenliu Zhou, Haoli Luan, Bo Li, Shidong Zhu 
30 Sep 2010
2 Citations
This detection system can be applied to products such as Award and Phoenix BIOS.
Analysis of the obtained data indicates significant differences between the two platforms in how errors manifest and how they are detected in the hardware and the operating system.
Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS’s unique and privileged position within the PC architecture.
Furthermore, the approach helps to quantify the interdependencies between system parameters and hardware costs.

See what other people are reading

Can artificial inteligence help software engineers?
5 answers
Can artificial inteligence help software engineers?
5 answers
How do different methodologies for quality assurance testing affect the identification and resolution of assumptions?
5 answers
Why is effiency anlysis is important in healtcare systems?
4 answers
Why is effiency anlysis is important in healtcare systems?
4 answers
How to measure performance in health system?
5 answers
What are soft services facilties maintenance?
5 answers
User what is the current state of the art and practice of technical debt in startups?
5 answers
How accurate and proven is the proposal of evolution?
5 answers
What are the code smells that developers feel hard to refactor?
5 answers
What are the negative impact of 3D Printing in terms of Security for Military and defense sector?
5 answers
Additive Manufacturing (AM), particularly in the military and defense sector, poses security risks due to vulnerabilities in 3D printing systems. These risks include the potential for malicious Trojans to compromise the quality of prints and reduce their strength significantly. Furthermore, the security concerns in AM extend beyond data security to physical threats like Technical Data Theft, Sabotage, and Illegal Part Manufacturing. The Office of the Inspector General for the US Department of Defense emphasizes the importance of securing AM systems to prevent unauthorized changes, safeguard design data integrity, and protect against threats like design file theft and unauthorized prints that could compromise safety, intellectual property, and even lead to manufacturing facility shutdowns. Implementing robust cybersecurity measures is crucial to mitigate these risks and ensure the integrity and security of AM processes in the military and defense sector.