Content deleted Content added
Tags: Mobile edit Mobile web edit Advanced mobile edit |
Tags: Mobile edit Mobile web edit Advanced mobile edit |
||
Line 20:
* Security functions, such as flash device lock down require SMM support on some chipsets
* System Sleep and Hibernate
* Control power management operations, such as managing the [[Voltage regulator module]]
* Emulate USB Mouse/Keyboard as [[PS/2 connector|PS/2]] Mouse/Keyboard (often referred to as ''USB legacy support'')<ref name="kernel.org">{{cite web
| url = https://www.kernel.org/doc/Documentation/x86/usb-legacy-support.txt
Line 28:
}}</ref>
* Centralize system configuration, such as on Toshiba and IBM/Lenovo notebook computers
*
System Management Mode can also be abused to run high-privileged [[rootkit]]s, as demonstrated at [[Black Hat Briefings|Black Hat]] 2008<ref>{{cite web|url=http://www.infoworld.com/d/security-central/hackers-find-new-place-hide-rootkits-252|title=Hackers find a new place to hide rootkits|author=Robert McMillan|date=10 May 2008|work=InfoWorld}}</ref> and 2015.<ref>{{cite web|url=http://hothardware.com/news/researchers-discover-rootkit-exploit-in-intel-processors-that-dates-back-to-1997|title=Researchers Discover Rootkit Exploit In Intel Processors That Dates Back To 1997|author=Rob Williams|date=7 August 2015|work=HotHardware.com}}</ref>
|