Cryptographically verifying firmware integrity.
How it works
Cryptographic hash values are computed for system and peripheral firmware. The hash values are compared against precomputed hash values for the identified firmware. A hash value mismatch may indicate that the firmware may have been tampered with or updated with a non-current release indicating a misconfiguration for the system.
- Requires cryptographically computed hash values of firmware
- Requires storage of precomputed firmware hash values
There are 3 techniques in this category, Firmware Verification.
|Cryptographically verifying firmware integrity.
|- Peripheral Firmware Verification
|Cryptographically verifying peripheral firmware integrity.
|- System Firmware Verification
|Cryptographically verifying installed system firmware integrity.
The following references were used to develop the Firmware Verification knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)