Breaking the Boundaries with Dynamically Loaded Applications
Sometimes we stare so long at a door that is closing that we see too late the one that is open.
—Alexander Graham Bell
In previous chapters, we have studied the firmware architectures and security hardening features of the security and management engine. Let’s recap the main design points: