Esc
Firmware Verification
Definition
Cryptographically verifying firmware integrity.
How it works
Cryptographic hash values are computed for system and peripheral firmware. The hash values are compared against precomputed hash values for the identified firmware. A hash value mismatch may indicate that the firmware may have been tampered with or updated with a non-current release indicating a misconfiguration for the system.
Considerations
- Requires cryptographically computed hash values of firmware
- Requires storage of precomputed firmware hash values
loading...
Technique Subclasses
There are 3 techniques in this category, Firmware Verification.
Name | ID | Definition | Synonyms |
---|---|---|---|
Firmware Verification | D3-FV | Cryptographically verifying firmware integrity. | |
- Peripheral Firmware Verification | D3-PFV | Cryptographically verifying peripheral firmware integrity. | |
- System Firmware Verification | D3-SFV | Cryptographically verifying installed system firmware integrity. |
loading...
References
All
Patent
Guideline
The following references were used to develop the Firmware Verification knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Methods and systems for hardware and firmware security monitoring
Reference Type: Patent Organization: ECLYPSIUM , Inc Author: Yuriy Bulygin, Oleksandr Bazhaniuk
System and method for hardware-based trust control management
Reference Type: Patent Organization: Trapezoid, Inc Author: Michael J. Dyer, Jose E. Gonzalez, Albert Caballero
Platform Firmware Resiliency Guidelines
Reference Type: Guideline Organization: NIST Author: NIST
D3FEND™
A knowledge graph of cybersecurity countermeasures