Firmware Tamper Detection

Modifications to system firmware should be detected by the system. Depending on the type of firmware tampering, detection is a very hard problem, however, certain mechanisms can and should be implemented:
  • Verification of timing anomalies which can be induced by interception/eavesdropping
  • Verification of state anomalies, e.g. content of certain HW-related ports/registers
  • For very high protection need, the deployment of dedicated co-processors with the purpose of software integrity verification.