P. 1
John Heasman- Firmware Rootkits: The Threat to the Enterprise

John Heasman- Firmware Rootkits: The Threat to the Enterprise

|Views: 114|Likes:
Published by White909

More info:

Published by: White909 on Dec 01, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/08/2014

pdf

text

original

How long before widespread TPM adoption?

How long before widespread TPM adoption?
--And secure bootstrap implementations for every OS?

And secure bootstrap implementations for every OS?
--5 years? 10 years? Ever?

5 years? 10 years? Ever?

Just whose problem is this and how do they/we fix it?

Just whose problem is this and how do they/we fix it?
--Vendors should add jumper to prevent update?

Vendors should add jumper to prevent update?

--Or

Or ““return to factory default
return to factory default””switch?
switch?
--Or hashes for all firmware revisions?

Or hashes for all firmware revisions?

Will we ever see malware target firmware?

Will we ever see malware target firmware?
--Will there ever be sufficient ROI?

Will there ever be sufficient ROI?

References

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->