Hacker News new | past | comments | ask | show | jobs | submit login

How can a successful firmware update possibly be validated if you can't trust the device in the first place?

An attacker can just implement whatever "install firmware version xyz" command by returning "ok, did it!" and remembering that version number if it ever needs to be displayed.

A more complex attacker could emulate the entire firmware in more powerful hardware of the same physical profile and selectively intercept any input and output.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: