dc.description.abstract | The need for updating BIOS is always required and the number of viruses which attack BIOS code and data is increasing. In fact, BIOS current recovery mechanism may still have chance that the boot-up section is destroyed by viruses. Thus it causes computers not to be able to boot up.
This paper proposed an improved architecture that can recover BIOS boot area automatically if BIOS boot area is corrupted. BIOS boot area are stored into two areas, external and internal memory block. Internal memory block is protected by hardware so that programs and viruses are not able to access it. When the system detects that the external memory boot block is destroyed, the rescue mechanism is enabled. The mechanism will copy the contents of the internal memory block to the external memory block. And that will ensure the process of boot-up can still be completed.
The whole BIOS auto-recovery process is performed at POST stage and therefore booting to OS is not required. Furthermore, the recovery mechanism doesn't need peripheral device supports (e.g. floppy, hard disk, monitor, keyboard…etc). And it also doesn't need to involve users' operation.(e.g. open case and adjust jumper). Every thing can be executed automatically. | en |
dc.relation.reference | 1 "ISA System Architecture," 3rd edition, Tom Shanley / Don Anderson, MindShare Inc.
2 "80386 Programmer's Reference Manual," Intel Inc.
3 "PC Interrupts," 1st edition, Ralf Brown / Jim Kyle, Addison Wisley Inc.
4 "System BIOS for IBM PCs, Compatibles, and EISA Computers," 3rd edition, Phoenix Technologies LTD.
5 "Intel 82371AB PCI-to-ISA/IDE Xcelerator (PIIX4)" datasheet
6 "Multi-Purpose Flash SST39SF010A / SSTS9SF020A / SST39SF040" datasheet
7 “Protect mode concept,” No. 217, Electronics Information Magazine
8 “BIOS密技大聲報”, 施威銘研究室著
9 “Flash memory BIOS for PC and notebook computers,” Jex Jerry, Communications, Computers and Signal Processing, 1991. IEEE Pacific Rim Conference.
10 “Computer Viruses as Artificial Life,” Eugene H. Spafford, Department of Computer Sciences, Purdue University.
11 “Current Trends in Computer Virus Research,” F. Cohen, 2nd Annual invited Symposium on Computer Viruses-Keynote Address, Oct. 10, 1988 New York.
12 “The Computer Virus Catalog,” K. Brunnstein, DPMA, IEEE, ACM 4th Cpmputer Virus and Security Conference, 1991 D.Lefkon ed. | en |