CHAPTER 9

image

Breaking the Boundaries with Dynamically Loaded Applications

Sometimes we stare so long at a door that is closing that we see too late the one that is open.

—Alexander Graham Bell

In previous chapters, we have studied the firmware architectures and security hardening features of the security and management engine. Let’s recap the main design points:

  • The security and management engine’s firmware starts from boot ROM (read-only memory), which is not erasable and not modifiable.
  • The boot ROM is the root of trust of the engine.
  • The majority of the engine’s firmware, including all applications, are stored in a flash device, together with ...

Get Platform Embedded Security Technology Revealed : Safeguarding the Future of Computing with Intel Embedded Security and Management Engine now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.