Dell is stepping to protect the Boot layer of PCS Tablets
Dell’s business laptops and tablets will get an extra layer of protection from hackers with a new security tool being loaded into the company’s portable computers. The new Dell security tool focuses on protecting the boot layer so PC hardware or software don’t malfunction. It secures the low-level UEFI (Unified Extensible Firmware Interface), which sits in a protected layer above the OS. An attack on this firmware can compromise a system at boot time. Hacking the firmware can cause the OS and hardware components to malfunction. Hackers have shown increasingly sophisticated ways in which the UEFI — which has replaced the conventional BIOS — can be infected with malware. Recovery from a hacked boot layer isn’t as easy as running an anti-virus program. It usually requires a system to be rebooted and firmware to be flashed before loading the OS. As a hacked UEFI is hard to to fix, Dell’s new security tool offers an alternative method. At boot, the tool verifies a UEFI snapshot with an identical copy in the cloud and can notify a user or system administrator of any inconsistency. A copy of the UEFI can then be reloaded on the computer to fix the problem. That’s just a start. The company is working on a feature in which hacked UEFI can “auto-remediate” itself, said David Konetski, executive director in the Client Solutions Office of the CTO at Dell. He did not share when that feature would be in PCs. Dell has also taken precautions to protect the process of verifying the UEFI with an image in the cloud, Konetski said. A copy of the UEFI image is sent from flash storage to a PC’s SRAM, and then data from the SRAM is then sent over a secure channel for verification. The cloud can be set up within a customer’s premises, which makes intercepting a UEFI hash even more difficult, Konetski said.