Firmware - Wikipedia
Firmware - Wikipedia
Computers
Automobiles
Other examples
Flashing
Flashing[4] involves the overwriting of
existing firmware or data, contained in
EEPROM or flash memory module
present in an electronic device, with new
data.[4] This can be done to upgrade a
device[5] or to change the provider of a
service associated with the function of
the device, such as changing from one
mobile phone service provider to another
or installing a new operating system. If
firmware is upgradable, it is often done
via a program from the provider, and will
often allow the old firmware to be saved
before upgrading so it can be reverted to
if the process fails, or if the newer
version performs worse. Free software
replacements for vendor flashing tools
have been developed, such as Flashrom.
Firmware hacking
Sometimes, third parties develop an
unofficial new or modified ("aftermarket")
version of firmware to provide new
features or to unlock hidden
functionality; this is referred to as
custom firmware. An example is
Rockbox as a firmware replacement for
portable media players. There are many
homebrew projects for various devices,
which often unlock general-purpose
computing functionality in previously
limited devices (e.g., running Doom on
iPods).
Security
Mark Shuttleworth has asserted that low-
quality, proprietary firmware is a major
threat to system security. As a potential
solution to this problem, he has called for
declarative firmware, which would
describe hardware linkage and
dependencies and not include executable
code.[9]
See also
Electronics
portal
Bootloader
Computer hardware
Coreboot
Custom firmware
Microcode
Proprietary device driver
Real-time operating system
ROM image
References
1. "What is firmware?" (http://incepator.pinza
ru.ro/software/what-is-firmware/) . 23
January 2013.
2. Opler, Ascher (January 1967). "Fourth-
Generation Software" (https://archive.org/
stream/TNM_4th_generation_software_ha
rdware_-_Datamation_20171010_0125/T
NM_4th_generation_software_hardware_-
_Datamation_20171010_0125_djvu.txt) .
Datamation. 13 (1): 22–24.
3. "Introduction to Computer Applications
and Concepts. Module 3: System
Software" (https://courses.lumenlearning.
com/zeliite115/chapter/reading-firmwar
e/) . Lumen.
4. "Flashing Firmware" (http://www.tech-faq.
com/flashing-firmware.html) . Tech-
Faq.com. Archived (https://web.archive.or
g/web/20110927010726/http://www.tech
-faq.com/flashing-firmware.html) from
the original on September 27, 2011.
Retrieved July 8, 2011.
5. "HTC Developer Center" (https://web.archi
ve.org/web/20110426201145/http://deve
loper.htc.com/adp.html) . HTC. Archived
from the original (http://developer.htc.co
m/adp.html) on April 26, 2011. Retrieved
July 8, 2011.
6. "Equation Group: The Crown Creator of
Cyber-Espionage" (http://www.kaspersky.
com/about/news/virus/2015/Equation-Gr
oup-The-Crown-Creator-of-Cyber-Espiona
ge) . Kaspersky Lab. February 16, 2015.
Archived (https://web.archive.org/web/20
151202101934/http://www.kaspersky.co
m/about/news/virus/2015/equation-grou
p-the-crown-creator-of-cyber-espionage)
from the original on December 2, 2015.
7. Dan Goodin (February 2015). "How
"omnipotent" hackers tied to NSA hid for
14 years—and were found at last" (https://
arstechnica.com/security/2015/02/how-o
mnipotent-hackers-tied-to-the-nsa-hid-for-
14-years-and-were-found-at-last/) . Ars
Technica. Archived (https://web.archive.o
rg/web/20160424062759/http://arstechni
ca.com/security/2015/02/how-omnipote
nt-hackers-tied-to-the-nsa-hid-for-14-years
-and-were-found-at-last/) from the
original on 2016-04-24.
8. "Breaking: Kaspersky Exposes NSA's
Worldwide, Backdoor Hacking of Virtually
All Hard-Drive Firmware" (https://www.dail
ykos.com/story/2015/02/17/1364910/-Br
eaking-Kaspersky-Exposes-NSA-s-Worldw
ide-Backdoor-Hacking-of-Virtually-All-Hard
-Drive-Firmware) . Daily Kos. February 17,
2015. Archived (https://web.archive.org/w
eb/20150225044646/http://www.dailyko
s.com/story/2015/02/17/1364910/-Break
ing-Kaspersky-Exposes-NSA-s-Worldwide-
Backdoor-Hacking-of-Virtually-All-Hard-Dri
ve-Firmware) from the original on
February 25, 2015.
9. "Shuttleworth: Firmware is the universal
Trojan • The Register" (https://www.thereg
ister.com/Print/2014/03/18/shuttleworth
_firmware_is_the_universal_trojan/) . The
Register. Retrieved 2023-05-03.
10. "MalCon 2010 Technical Briefings" (http
s://web.archive.org/web/2011070404060
5/http://malcon.org/web/techbrief/malco
n-2010-technical-briefings/) . Malcon.org.
Archived from the original (http://malcon.
org/web/techbrief/malcon-2010-technical
-briefings/) on 2011-07-04.
11. "Hacker plants back door in Symbian
firmware" (https://web.archive.org/web/2
0130521142131/http://www.h-online.co
m/security/news/item/Hacker-plants-bac
k-door-in-Symbian-firmware-1149926.htm
l) . H-online.com. 2010-12-08. Archived
from the original (http://www.h-online.co
m/security/news/item/Hacker-plants-bac
k-door-in-Symbian-firmware-1149926.htm
l) on 21 May 2013. Retrieved 2013-06-14.
12. "Why the Security of USB Is
Fundamentally Broken" (https://www.wire
d.com/2014/07/usb-security/) .
Wired.com. 2014-07-31. Archived (https://
web.archive.org/web/20140803200841/h
ttp://www.wired.com/2014/07/usb-securi
ty/) from the original on 2014-08-03.
Retrieved 2014-08-04.
13. "BadUSB - On Accessories that Turn Evil"
(https://www.blackhat.com/us-14/briefing
s.html#badusb-on-accessories-that-turn-e
vil) . BlackHat.com. Archived (https://we
b.archive.org/web/20140808053344/http
s://www.blackhat.com/us-14/briefings.ht
ml#badusb-on-accessories-that-turn-evil)
from the original on 2014-08-08. Retrieved
2014-08-06.
14. Karsten Nohl; Sascha Krißler; Jakob Lell
(2014-08-07). "BadUSB – On accessories
that turn evil" (https://srlabs.de/wp-conte
nt/uploads/2014/07/SRLabs-BadUSB-Bla
ckHat-v1.pdf) (PDF). srlabs.de. Archived
(https://web.archive.org/web/201610190
34729/https://srlabs.de/wp-content/uplo
ads/2014/07/SRLabs-BadUSB-BlackHat-v
1.pdf) (PDF) from the original on 2016-
10-19. Retrieved 2014-08-23.
15. "BadUSB Malware Released — Infect
millions of USB Drives" (https://web.archi
ve.org/web/20141006121457/http://hack
ingpost.com/badusb-malware-infect-milli
ons-of-usb/) . The Hacking Post. Archived
from the original on 6 October 2014.
Retrieved 7 October 2014.
16. Greenberg, Andy. "The Unpatchable
Malware That Infects USBs Is Now on the
Loose" (https://www.wired.com/2014/10/
code-published-for-unfixable-usb-attac
k/) . WIRED. Archived (https://web.archiv
e.org/web/20141007092141/http://www.
wired.com/2014/10/code-published-for-u
nfixable-usb-attack/) from the original on
7 October 2014. Retrieved 7 October
2014.
Retrieved from
"https://en.wikipedia.org/w/index.php?
title=Firmware&oldid=1165808562"