Firmware Verification
Definition
Cryptographically verifying firmware integrity.
How it works
Cryptographic hash values are computed for system and peripheral firmware. The hash values are compared against precomputed hash values for the identified firmware. A hash value mismatch may indicate that the firmware may have been tampered with or updated with a non-current release indicating a misconfiguration for the system.
Considerations
- Requires cryptographically computed hash values of firmware
- Requires storage of precomputed firmware hash values
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 3 techniques in this category, Firmware Verification.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Firmware Verification | D3-FV | Cryptographically verifying firmware integrity. | |
| - Peripheral Firmware Verification | D3-PFV | Cryptographically verifying peripheral firmware integrity. | |
| - System Firmware Verification | D3-SFV | Cryptographically verifying installed system firmware integrity. |
References
The following references were used to develop the Firmware Verification knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)