This reference to BIOS exploitation discusses the Reverse Engineering techniques used to extract information from BIOS and expansion ROMs, explaining security weaknesses, potential exploitation scenarios, and protection in a methodical manner.
Techniques for exploiting SMBIOS/DMI, such as BIOS rootkits, computer defense, and embedded x86 BIOS, are also explored.
The primary target audience for this book is system programmers and experts in computer security. Additionally, this book might be very helpful to electronic engineers, computer technicians, and computer hobbyists. Additionally, computer science students may find it helpful owing to the extensive description of applied computer architecture (x86 architecture) and compression techniques. Nothing, however, precludes anyone who is interested in BIOS technology from reading this book and benefiting from it.