Repository logo
 

Preventing malicious modifications to firmware using hardware root of trust (HRoT)

dc.contributor.authorPodder, Rakesh, author
dc.contributor.authorRay, Indrajit, advisor
dc.contributor.authorSreedharan, Sarath, advisor
dc.contributor.authorRay, Indrakshi, committee member
dc.contributor.authorJayasumana, Anura, committee member
dc.date.accessioned2025-06-02T15:19:57Z
dc.date.available2025-06-02T15:19:57Z
dc.date.issued2025
dc.description.abstractAs computing devices such as servers, workstations, laptops, and embedded systems are transported from one site to another, they are susceptible to unauthorized firmware modifications. Additionally, traditional over-the-air (OTA) firmware update mechanisms often lack robust security features, exposing devices to threats such as unauthorized updates, malware injection, etc. While the industry has made efforts to secure the boot process using a hardware root of trust (HRoT), post-boot firmware tampering remains a significant risk. In this work, we introduce a comprehensive framework that addresses firmware security across both transit and remote update phases by leveraging HRoT and cryptographic techniques. To prevent unauthorized firmware modifications during device shipment, we propose the PIT-Cerberus (Protection In Transit) framework, which enhances the HRoT's attestation capabilities to securely lock and unlock BIOS/UEFI. In addition, we introduce the Secure Remote Firmware Update Protocol (S-RFUP) to fortify OTA firmware updates by incorporating industry standards such as Platform Level Data Model (PLDM) and Management Component Transport Protocol (MCTP). These standards enable interoperability across diverse platforms while reducing management complexity. The protocol enhances security and operational integrity during updates, ensuring that only authenticated and verified firmware modifications occur. Both frameworks are implemented within a trusted microcontroller as part of Project Cerberus, an open-source security platform for server hardware. We present a security analysis, implementation details, and validation results, demonstrating the effectiveness of our approach in securing firmware both in transit and during remote updates.
dc.format.mediumborn digital
dc.format.mediummasters theses
dc.identifierPodder_colostate_0053N_18850.pdf
dc.identifier.urihttps://hdl.handle.net/10217/240939
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartof2020-
dc.rightsCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.
dc.subjectfirmware
dc.subjectMCTP
dc.subjectProject Cerberus
dc.subjectHRoT
dc.subjectBIOS/BMC
dc.subjectPLDM
dc.titlePreventing malicious modifications to firmware using hardware root of trust (HRoT)
dc.typeText
dcterms.rights.dplaThis Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
thesis.degree.disciplineComputer Science
thesis.degree.grantorColorado State University
thesis.degree.levelMasters
thesis.degree.nameMaster of Science (M.S.)

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Podder_colostate_0053N_18850.pdf
Size:
5.18 MB
Format:
Adobe Portable Document Format