Code Review Guidelines for Boot Firmware
Based on previous analysis of firmware issues, vulnerabilities fall into 8 general categories that should be the focus of secure code reviews:
- External Input
- Race Conditions
- Hardware Input
- Secret Handling
- Register Lock
- Secure Configuration
- Replay/Rollback
- Cryptography
This section discusses each class of vulnerability and summarizes approaches for review.