Skip to content

Commit

Permalink
Boot attack clarification.
Browse files Browse the repository at this point in the history
Signed-off-by: NicholasWoodIMG <142398143+NicholasWoodIMG@users.noreply.github.com>
  • Loading branch information
NicholasWoodIMG authored and rsahita committed Jul 30, 2024
1 parent 86d9d11 commit e2d25db
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion specification/src/chapter2.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -477,10 +477,12 @@ Logical or physical
a| * Glitching to bypass secure boot
* Retrieving residual confidential memory after a system reset
a| Implement robust power management, and adopt glitch-safe software techniques. +
+
Industry best practice should be followed. For example: ensuring un-initialized variables are not used; implementing integrity checking of critical data and hardware provisioned parameters; implementing redundancy in encoding, verification, branching, and critical logic. +
+
Adopt randomization techniques between boot sessions. +
For example: cryptographic memory protection with at least boot freshness; register ranomization.
+
For example: cryptographic memory protection with at least boot freshness; register randomization.

| SR_PHY_004
| Subverting supply chains
Expand Down

0 comments on commit e2d25db

Please sign in to comment.