• Complain

Jiewen Yao - Building Secure Firmware : Armoring the Foundation of the Platform

Here you can read online Jiewen Yao - Building Secure Firmware : Armoring the Foundation of the Platform full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Jiewen Yao Building Secure Firmware : Armoring the Foundation of the Platform
  • Book:
    Building Secure Firmware : Armoring the Foundation of the Platform
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2020
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Building Secure Firmware : Armoring the Foundation of the Platform: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Building Secure Firmware : Armoring the Foundation of the Platform" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Jiewen Yao: author's other books


Who wrote Building Secure Firmware : Armoring the Foundation of the Platform? Find out the surname, the name of the author of the book and a list of all author's works by series.

Building Secure Firmware : Armoring the Foundation of the Platform — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Building Secure Firmware : Armoring the Foundation of the Platform" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Jiewen Yao and Vincent Zimmer Building Secure Firmware Armoring the - photo 1
Jiewen Yao and Vincent Zimmer
Building Secure Firmware
Armoring the Foundation of the Platform
1st ed.
Jiewen Yao Shanghai China Vincent Zimmer Issaquah WA USA Any source code - photo 2
Jiewen Yao
Shanghai, China
Vincent Zimmer
Issaquah, WA, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/978-1-4842-6105-7 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-6105-7 e-ISBN 978-1-4842-6106-4
https://doi.org/10.1007/978-1-4842-6106-4
Jiewen Yao and Vincent Zimmer 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

To my lovely wife, Wenjun Zeng. Thank you for your constant encouragement and unconditional support!

Jiewen Yao

To my parents; to my wife, Jan; and to my daughters, Ally and Zoe. Your support and love are rays of sunshine that warm my days.

Vincent Zimmer

Foreword

When Saudi Aramco was attacked in August 2012 by the Shamoon computer virus, it was a wake-up call to the entire industry. Saudi Aramco is one of the largest companies in the world and holds the second largest amount of crude oil reserves. A shutdown of Saudi Aramco for a prolonged amount of time would have had a devastating impact on the oil economy, and this could have plunged the world into an economic recession.

The Shamoon virus was by todays standards a relatively simple virus. It overwrote the master boot record on the hard disk with garbage, rendering the system unbootable. While the infestation was effective reportedly more than 30,000 systems got impacted the much-feared secondary effect of the global oil supply chain hiccup didnt materialize. That was in part because the hard disk is an easy to service component and Aramco was able to replace the hard disks in time to avoid any serious impact.

However, this attack made folks in the industry and intelligence communities around the world wonder: What would have happened if Shamoon went after a non-serviceable component, like the flash chips where the system firmware is stored? This is much harder to repair on-site, and it would have required the systems to be shipped back to the manufacturer. This would have taken a lot more time, and in that case a global oil supply shortage could not have been avoided, potentially even triggering a global recession.

This incident prompted a cross-industry/cross-government collaboration that eventually resulted in a set of recommendations from the National Institute of Standards and Technology (NIST). The first set of recommendations, BIOS Protect Guidelines (NIST SP800-147), described requirements such as
  • BIOS update authentication: The firmware needs to be signed by the proper authority.

  • Integrity protection: The firmware cannot be modified, either unintended or maliciously.

  • Non-bypassibility: There is no way to bypass the authenticated firmware update mechanism.

This specification was followed up in 2018 by another NIST publication, Platform Firmware Resiliency Guidelines (NIST SP800-193). This specification extended the previous one by focusing on recovery. Its central tenet was simple: providing protection against unauthorized firmware updates is not enough. The firmware is a complex piece of software, and it will, probabilistically, contain bugs that can be exploited by an attacker. How do you quickly and seamlessly recover if this happens?

Before you consider this problem to be a PC-only threat, think again. With the proliferation of IoT devices in homes and factories, and SCADA devices to control the national grid, firmware security has become a key part of the worlds critical infrastructure protection. Just imagine the harm a malicious attacker could do by taking over the firmware of pipeline controllers in a gas line in Siberia, Russia, during the winter. Youll be hard-pressed to send someone out there to fix the problem.

The Saudi Aramco attack and its resulting NIST secure firmware recommendations solidified the importance of firmware security in the industry. Those recommendations built on years of academic and industrial research in this area. I was personally involved in some of these efforts, ranging from IBMs physical secure coprocessor (IBM 47xx) projects and TCPA/TCG frameworks to secure hypervisor research and working with other industry partners on the foundations of NIST SP800-147.

The authors Jiewen Yao and Vincent Zimmer have bundled together into this book their combined years of experience in developing secure firmware and building resilient systems. Every computer, big or small, starts with firmware, and if thats compromised, all is lost, so following the authors guidance is as relevant today as it was in 2012.

Leendert van Doorn

Redmond, WA, USA

Organization and What Is Covered

Currently, we already have books to separately introduce the topics of firmware and security. The purpose of this book is to link these areas together and provide the best practices in the security development of firmware.

The whole book consists of four parts:

Part I: Overview

Chapter includes a brief overview of the firmware in a system.

Chapter describes a proactive development lifecycle for the firmware. We will introduce a general threat model for the firmware and use a real example to demonstrate how to do threat model analysis.

Part II: Security Architecture

Chapter describes the first aspect of the firmware resiliency protection.

Chapter describes the second aspect of the firmware resiliency detection.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Building Secure Firmware : Armoring the Foundation of the Platform»

Look at similar books to Building Secure Firmware : Armoring the Foundation of the Platform. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Building Secure Firmware : Armoring the Foundation of the Platform»

Discussion, reviews of the book Building Secure Firmware : Armoring the Foundation of the Platform and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.