Blog

In two previous articles, I looked at the JTAG access port from a security perspective, and considered what exposure the choice of BMC operating system might have on a platform supporting At-Scale Debug. Now, letโ€™s consider the root of all trust, the silicon itself, and see what options exist for locking it down.
ASSET was recently awarded a multi-year contract for embedding boundary-scan test technology within a military system design. This meets a requirement of greater than 92% structural test diagnostic accuracy in-system, and will save millions of dollars over the lifespan of the system.
Security through obscurity is not a meaningful means to mitigate malevolent attacks. With the greater forensics capabilities offered by At-Scale Debug (ASD), how are platforms protected?
In Episode 12, I wrote a simple โ€œHello World!โ€ application in โ€˜Cโ€™ using the built-in UEFI shell functions. In Episode 13, I failed in an attempt to re-write that application using standard โ€˜Cโ€™ library functions, such as printf(). Iโ€™ve learned a lot since then โ€“ hereโ€™s how to write more sophisticated programs.
Archives