Browse Prior Art Database

Methods to protect flash memory parts against certain types of virus attacks.

IP.com Disclosure Number: IPCOM000015755D
Original Publication Date: 2002-Jun-11
Included in the Prior Art Database: 2003-Jun-21
Document File: 1 page(s) / 39K

Publishing Venue

IBM

Abstract

A method is disclosed to prevent a certain class of virus attack.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 59% of the total text.

Page 1 of 1

Methods to protect flash memory parts against certain types of virus attacks.

A method is disclosed to prevent a certain class of virus attack.

Today's personal computers incorporate a nonvolatile memory module that is typically used to store the systems BIOS code. The common technology for this module is referred to in the industry as "Flash" technology. This technology allows the module to be erased and reprogrammed in the event of a BIOS upgrade.

When this technology was introduced in the 1980's, the number of erase / rewrite cycles was limited (in the 100's on very early parts). If you exceeded this number of erase / write cycles, the part would start to show failures during the rewrite. As the technology has matured, this limitation on erase / write cycles has gone up by orders of magnitude (tens of thousands of cycles are typical in todays parts).

The early flash update programs were all DOS based, requiring the user to boot a DOS diskette and provide several manual inputs. With this type of update scheme, it would be virtually impossible to exceed the erase / rewrite limit of todays flash parts. However, recently there has been a push to make flash update a process that can be run under the operating system. While this adds convenience and flexibility to the process, it opens the door to a potential virus attack that could render the system unusable by merely invoking the flash update routine over and over. (Various ways can be envisioned to hide this acti...