Skip to content

Investigate: Wipe memory at startup with QOS bootloader #125

@emostov

Description

@emostov

"on hardware wallets, one of the incomplete but helpful defense mechanisms is that an early part of the boot (bootloader) wipes some or all of the unused volatile memory before giving control to some firmware component. This way, even if the newly loaded firmware is malicious or buggy and the previously loaded firmware left something important in RAM, there's a good chance that it's wiped before it can get leaked. This is relevant since power of the embedded devices can be pulled at any moment, so this is a common scenario."

"For QuorumOS, a similar concept may help in cases where the attacker can e.g., "only" get control or find a memory leak vulnerability in a rebooted state after a previous panic, unexpected shutdown or other error condition. In that case, wiping the initial memory just in case could avoid practical impacts." ... "Also, it's likely the AWS Nitro VMs already have a thoroughly cleared memory on any logical restart since this is an obvious security problem otherwise. Still, I thought this is worth mentioning concept-wise." (@cr-tk)

ref: #122

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions