Useful Links
Computer Science
Cybersecurity
Firmware Security
1. Introduction to Firmware Security
2. Types of Firmware
3. Hardware-Enabled Security Foundations
4. The Secure Firmware Lifecycle
5. Securing the Boot Process
6. Firmware Attack Vectors and Vulnerabilities
7. Firmware Analysis and Reverse Engineering
8. Platform-Specific Security Considerations
9. Industry Standards and Best Practices
10. Firmware Security Assessment and Testing
11. Incident Response and Forensics
12. Emerging Trends and Future Considerations
Hardware-Enabled Security Foundations
Trusted Platform Module (TPM)
TPM Architecture and Functions
TPM 1.2 vs TPM 2.0
Cryptographic Key Generation
Secure Storage and Sealing
Random Number Generation
Platform Configuration Registers (PCRs)
Measurement Storage
PCR Banks
Use in Attestation
Extend Operations
Key Hierarchy and Management
Endorsement Key (EK)
Storage Root Key (SRK)
Attestation Identity Key (AIK)
Key Derivation Functions
TPM Commands and Operations
Administrative Commands
Cryptographic Operations
Attestation Commands
Remote Attestation
Attestation Protocols
Quote Generation
Use Cases and Applications
Intel Security Technologies
Intel Boot Guard
Verified Boot Process
Policy Enforcement
Key Management
Intel BIOS Guard
BIOS Update Protection
Rollback Prevention
Secure Update Process
Intel Software Guard Extensions (SGX)
Secure Enclave Creation
Application Isolation
Memory Encryption
Converged Security and Management Engine (CSME)
Platform Security Services
Firmware Management
Security Vulnerabilities
Intel Trusted Execution Technology (TXT)
Dynamic Root of Trust
Measured Boot Extensions
AMD Security Technologies
AMD Secure Processor (PSP)
Secure Boot Capabilities
Cryptographic Operations
Platform Security Functions
Secure Encrypted Virtualization (SEV)
Memory Encryption
Virtual Machine Isolation
Key Management
Platform Secure Boot (PSB)
Boot Process Protection
Key Management
Policy Enforcement
AMD Memory Guard
Memory Encryption
Protection Mechanisms
ARM TrustZone
Architecture Overview
Secure World and Normal World
Isolation Mechanisms
Secure Resource Management
Secure Monitor
Secure Monitor Call (SMC)
Context Switching
Secure Service Invocation
TrustZone Implementation
Hardware Components
Software Components
Security Policies
Previous
2. Types of Firmware
Go to top
Next
4. The Secure Firmware Lifecycle