Preventing malicious modifications to firmware using hardware root of trust (HRoT)
dc.contributor.author | Podder, Rakesh, author | |
dc.contributor.author | Ray, Indrajit, advisor | |
dc.contributor.author | Sreedharan, Sarath, advisor | |
dc.contributor.author | Ray, Indrakshi, committee member | |
dc.contributor.author | Jayasumana, Anura, committee member | |
dc.date.accessioned | 2025-06-02T15:19:57Z | |
dc.date.available | 2025-06-02T15:19:57Z | |
dc.date.issued | 2025 | |
dc.description.abstract | As computing devices such as servers, workstations, laptops, and embedded systems are transported from one site to another, they are susceptible to unauthorized firmware modifications. Additionally, traditional over-the-air (OTA) firmware update mechanisms often lack robust security features, exposing devices to threats such as unauthorized updates, malware injection, etc. While the industry has made efforts to secure the boot process using a hardware root of trust (HRoT), post-boot firmware tampering remains a significant risk. In this work, we introduce a comprehensive framework that addresses firmware security across both transit and remote update phases by leveraging HRoT and cryptographic techniques. To prevent unauthorized firmware modifications during device shipment, we propose the PIT-Cerberus (Protection In Transit) framework, which enhances the HRoT's attestation capabilities to securely lock and unlock BIOS/UEFI. In addition, we introduce the Secure Remote Firmware Update Protocol (S-RFUP) to fortify OTA firmware updates by incorporating industry standards such as Platform Level Data Model (PLDM) and Management Component Transport Protocol (MCTP). These standards enable interoperability across diverse platforms while reducing management complexity. The protocol enhances security and operational integrity during updates, ensuring that only authenticated and verified firmware modifications occur. Both frameworks are implemented within a trusted microcontroller as part of Project Cerberus, an open-source security platform for server hardware. We present a security analysis, implementation details, and validation results, demonstrating the effectiveness of our approach in securing firmware both in transit and during remote updates. | |
dc.format.medium | born digital | |
dc.format.medium | masters theses | |
dc.identifier | Podder_colostate_0053N_18850.pdf | |
dc.identifier.uri | https://hdl.handle.net/10217/240939 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2020- | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | firmware | |
dc.subject | MCTP | |
dc.subject | Project Cerberus | |
dc.subject | HRoT | |
dc.subject | BIOS/BMC | |
dc.subject | PLDM | |
dc.title | Preventing malicious modifications to firmware using hardware root of trust (HRoT) | |
dc.type | Text | |
dcterms.rights.dpla | This Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | Colorado State University | |
thesis.degree.level | Masters | |
thesis.degree.name | Master of Science (M.S.) |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Podder_colostate_0053N_18850.pdf
- Size:
- 5.18 MB
- Format:
- Adobe Portable Document Format