Sanity check time- Firmware exploits as new vector for cyberattack?
Leo Mauler
webgiant at yahoo.com
Wed May 21 17:16:39 CDT 2008
The physical switch is both the best possible choice,
and the only one which will never be acceptable to a
proprietary company because it gives power to the
consumer.
--- "Monty J. Harder" <mjharder at gmail.com> wrote:
> Of course it's a danger. If you build hardware that
> allows the firmware to
> be updated remotely, you're vulnerable to malware
> that deliberately bricks
> it.
>
> Good design for firmware would put a very minimal
> block of code in true ROM,
> which would be sufficient to load a firmware update
> into flash memory. It
> might require physical access to a special switch to
> do that, but it would
> prevent bricking the hardware due to a bad flash
> operation, whether
> malicious or merely accidental.
>
> Another option is to include a large public RSA key
> for the hardware
> manufacturer in the ROM, which would be used to
> authenticate any firmware
> updates. Since that smacks of "tivoization", I'd
> say allowing the owner of
> the hardware to bypass that with the aforementioned
> physical switch would
> probably be a good bet; just use the RSA key to
> validate remotely loaded
> updates.
>
>
>
> On Tue, May 20, 2008 at 11:34 PM, Oren Beck
> <orenbeck at gmail.com> wrote:
>
> >
>
http://www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1
> >
> > Bull or danger?
> >
> > --
> > Oren Beck
> >
> > 816.729.3645
> > _______________________________________________
> > Kclug mailing list
> > Kclug at kclug.org
> > http://kclug.org/mailman/listinfo/kclug
> >
> > _______________________________________________
> Kclug mailing list
> Kclug at kclug.org
> http://kclug.org/mailman/listinfo/kclug
>
More information about the Kclug
mailing list