2.7b Assess Firmware Reverse Engineering Protections

2.7b Assess Firmware Reverse Engineering Protections


Requirement Description:

Verify that the firmware includes security controls designed to hinder reverse engineering, such as:

  • Removal of debugging symbols

  • Use of binary obfuscation

  • Stripped binaries

  • Encryption of sensitive code or data sections

  • Secure boot chaining


DUT Confirmation Details:

(To be filled based on vendor/OEM declaration of security controls present in the firmware.)


DUT Software Details:

(Mention OS type, version, and build info relevant to firmware analysis.)


Hash Checksum Verification for DUT’s Software Image:

(Provide SHA-256 or SHA-512 hash of the firmware image used for analysis.)


DUT Configuration:

(Mention if any configuration settings are required to enable/disable reverse engineering protection features.)


Pre-Conditions:

The vendor shall provide the following:

  • Documentation outlining the firmware reverse engineering protection mechanisms implemented.

    • List of techniques: stripping symbols, use of packers/obfuscators, encryption, integrity checks, etc.


Test Plan:

To assess whether reverse engineering protections are active and effective in the firmware image.


Total Number of Test Cases:

1


Test-bed Diagram with Interfaces and IPs:

(Include the setup with workstation, analysis tools, DUT access, etc. if required.)


Last updated

Was this helpful?