www.design-reuse-china.com
搜索,选择,比较,与提供商进行安全高效的联系
Design & Reuse We Chat
D&R中国官方微信公众号,
关注获取最新IP SOC业界资讯

Addressing the growing threat of firmware attacks on enterprise edge computing platforms

The threat landscape facing edge-computing systems in enterprise-level applications is dire. As this threat environment evolves, defending against these intrusions has become increasingly urgent.

www.ednasia.com, Oct. 06, 2021 – 

Recent high-profile hacks into mission-critical edge computing systems in enterprise-level applications have shown that hackers are growing smarter and more sophisticated in their attempts to avoid detection. With IT security and visibility efforts still largely focused higher in the stack at the application layer, bad actors are seeking to breach systems further down the stack at the firmware level. As this threat environment evolves, defending against these intrusions has become increasingly urgent, though the specifics of how exactly to do so remain frequently overlooked. Prior to proposing solutions for firmware intrusions however, it is important to understand why and how they are happening and what the immediate and long term goals of the attackers are.

Ongoing Threat Environment Facing Computing Platforms

Edge computing platforms in the enterprise are a prime target for cybercriminals. Enterprises have grown wise to their vulnerability however and introduced a bevy of security software to prevent and detect attacks. A significant percentage of these solutions operate only on the application level at the top of the stack. Clever hackers have realized that if they enter the system beneath the application layer at the firmware level, they can avoid detection from software and OS security.

"...fixing zero-day hacks in firmware or hardware can be incredibly time-consuming, leaving the system in question vulnerable for longer than a software breach would.",

Because it takes a higher degree of difficulty to hack the firmware, it is not as well-monitored and defensed as the higher layers in the stack. Firmware, and to an even greater degree hardware, is also not as easily patched or updated as software and is much more costly. Once inside the firmware, hackers can disable remote firmware updates, making it impossible to fix remotely and thus requiring the service of a technician with physical access to the firmware, often requiring a complete shutdown and an on-site visit that can be quite costly for large-scale deployments. This process means fixing zero-day hacks in firmware or hardware can be incredibly time-consuming, leaving the system in question vulnerable for longer than a software breach would. These factors have contributed to a rise in firmware attack frequency both from state-sponsored actors and from smaller and less well-resourced but still dangerous private groups.

click here to read more...

 Back

业务合作

添加产品

供应商免费录入产品信息

点击此处了解更多关于D&R的隐私政策

© 2026 Design And Reuse

版权所有

本网站的任何部分未经Design&Reuse许可,
不得复制,重发, 转载或以其他方式使用。