The first formal verification of a prototype of Arm CCA firmware

As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for computing architectures. Applications that process such data must trust the s… Continue reading The first formal verification of a prototype of Arm CCA firmware

Destructive firmware attacks pose a significant threat to businesses

As business workforces become increasingly distributed, IT leaders say it’s harder than ever to defend against firmware attacks, according to HP Wolf Security. The growing threat of destructive firmware attacks The shift to hybrid work models has trans… Continue reading Destructive firmware attacks pose a significant threat to businesses

ISaPWN – research on the security of ISaGRAF Runtime

This report includes an analysis of the ISaGRAF framework, its architecture, the IXL and SNCP protocols and the description of several vulnerabilities the Kaspersky ICS CERT team had identified. Continue reading ISaPWN – research on the security of ISaGRAF Runtime

Is it possible to assess the integrity of an SSD’s firmware using SMART results or drive details?

I recently bought a used SanDisk SSD and I am curious to know if there is any way to assess the integrity of its firmware using information such as SMART or drive details.
In addition to SMART information, SanDisk Dashboard application als… Continue reading Is it possible to assess the integrity of an SSD’s firmware using SMART results or drive details?

Is Mac OS safer to use as far as firmware rootkits, cold boot attacks and evil maid?

Windows machines have things like TPM and Secure boot to help protect against firmware rootkits, but is Mac any safer in these regards? How does Mac work in the boot stage and is it any less suceptable to firmware rootkits? Are there any… Continue reading Is Mac OS safer to use as far as firmware rootkits, cold boot attacks and evil maid?