Hardware security

Table of Contents

Defending firmware

Why is it difficult? Lots of design constraints, so “low-hanging fruit” defenses may be omitted, and there might be unclear error handling strategies (you might not be able to rely on someone restarting the system). Also, fragmented development process → unclear security guarantees, difficult patching process, reporting nightmare. Finally, missing entropy sources for randomness, so security things (e.g. crypto) relying on entropy might be bypassable.

Traditional defenses:

Adoption in practice:

Recent defenses: