Content deleted Content added
已加入至分類 Tags: Mobile edit Mobile web edit Advanced mobile edit |
Tags: Mobile edit Mobile web edit Advanced mobile edit |
||
Line 33:
* Centralize system configuration, such as on Toshiba and IBM/Lenovo notebook computers
* Managing the [[Trusted Platform Module]] (TPM) include dTPM and fTPM<ref>[https://www.youtube.com/watch?v=X72LgcMpM9k&feature=player_detailpage#t=2070s Google Tech Talks - Coreboot - 00:34:30]</ref>
* Platform-specific hardware control programs, including USB
System Management Mode can also be abused to run high-privileged [[rootkit]]s, as demonstrated at [[Black Hat Briefings|Black Hat]] 2008<ref>{{cite web|url=http://www.infoworld.com/d/security-central/hackers-find-new-place-hide-rootkits-252|title=Hackers find a new place to hide rootkits|author=Robert McMillan|date=10 May 2008|work=InfoWorld}}</ref> and 2015.<ref>{{cite web|url=http://hothardware.com/news/researchers-discover-rootkit-exploit-in-intel-processors-that-dates-back-to-1997|title=Researchers Discover Rootkit Exploit In Intel Processors That Dates Back To 1997|author=Rob Williams|date=7 August 2015|work=HotHardware.com}}</ref>
|