Detection is the second element in firmware resiliency. Even if we use multiple ways to protect the firmware, a vulnerability in software or hardware may still cause the firmware component to be modified or corrupted. As such, we need to have a way to inform the root-of-trust for detection (RTD) to perform the integrity detection in the boot flow. The detection may happen for the mutable code and data components or just the configurable data. Similar to protection, the main threat is from both the software attacker and the ...
4. Firmware Resiliency: Detection
Get Building Secure Firmware: Armoring the Foundation of the Platform now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.