摘要 |
In various embodiments, boot code in a computer system may make itself inaccessible after completing its boot operations, thus preventing it from being modified by unauthorized code subsequent to the boot operation. In some embodiments, this inaccessibility may make itself unreadable, so that it cannot be read and analyzed by unauthorized code. One or more specific startup triggers, such as a system reset, may make the boot code accessible again so that it can perform its boot operations before making itself inaccessible again.
|