Esc
Peripheral Firmware Verification
Definition
Cryptographically verifying peripheral firmware integrity.
How it works
Peripherial firmware is collected and analyzed on a host either periodically or on demand. This information may be collected for future comparisons.
Changes in firmware hash values may indicate that the firmware has been tampered with or that firmware images are not maintained to current baselined versions, or even known vulnerable versions are deployed.
Considerations
- Trust baselines will need to be generated for specific devices
- Changes to trusted configurations will need to be managed across the enterprise
loading...
loading...
References
All
Patent
The following references were used to develop the Peripheral Firmware Verification knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Methods and systems for hardware and firmware security monitoring
Reference Type: Patent Organization: ECLYPSIUM , Inc Author: Yuriy Bulygin, Oleksandr Bazhaniuk
System and method for hardware-based trust control management
Reference Type: Patent Organization: Trapezoid, Inc Author: Michael J. Dyer, Jose E. Gonzalez, Albert Caballero
D3FEND™
A knowledge graph of cybersecurity countermeasures