Firmware Tamper Detection
Firmware Tamper Detection
Modifications to system firmware should be detected by the system. Depending on the type of firmware tampering, detection is a very hard problem, however, certain mechanisms can and should be implemented:
- Verification of timing anomalies which can be induced by interception/eavesdropping
- Verification of state anomalies, e.g. content of certain HW-related ports/registers
- For very high protection need, the deployment of dedicated co-processors with the purpose of software integrity verification.
Further Reading:
Further Reading: