Firmware security
Want to keep your solution secure?
Eltan is the expert in firmware and security for PC and communication
technology since 1998.
Check out some of the protection mechanisms we can offer for your product below!
We’ll help you find the perfect security solution for your needs!
Full boot protection
Chain of Trust + Root of Trust
A Chain of Trust is established by validating each component of hardware and software.
The Hardware Root of Trust (HRoT) is derived from secure hardware components like the TPM.
The Software Root of Trust (SRoT) is derived from cryptography measuring and validating software components.
Flash memory protection
Intel® Boot Guard, AMD Platform Secure Boot
Verify initial boot block from flash to kick off the Chain of Trust into the BIOS. Propagates Chain of Trust from trusted firmware to BIOS read from flash.
RPMC / eRPMC (replay protected monotonic counter) support
Allow usage of HMAC key to protect against flash swapping. Using the increment and read counter to detect external access to the flash device.
Flash encryption
Defend against physical and unauthorized reading of flash to keep internals secure.
BIOS
protection
Measured Boot
Measure software components before execution to allow detection of changed software components. The results are stored in a trusted secure device like the TPM.
Verified Boot
Verify software components before execution. If tempering is detected prevent booting/warn to minimize impact on system and local data. Ensuring only trusted code is executed.
Firmware Redundancy
Allow fallback options and redundancy for the firmware components. Secures against failure while upgrading BIOS.
UEFI Secure Boot
Only allow cryptographically signed bootloaders to load the operating system. Propagates Chain of Trust from BIOS payload to operating system.
Phoenix SecureCore™
Secure the platform boot from flash to operating system using Phoenix Technologies® features.
Ram
protection
Intel® Hardware Shield and Total Memory encryption
Intel® TME is effective against hardware or physical attacks on system memory, such as a cold boot attack.
Memory clear
Clear BIOS from memory before handing off control to the payload or operating system. Prevents leaking sensitive system information.