Attacks against the hardware and firmware of a device stand as some ofthe highest impact threats facing modern organizations. Firmware retainsthe highest privileges, allows attackers to bypass traditional controls, andgrants a higher level of persistence. The firmware layer has also quicklybecome one of the most active areas of cybersecurity with attackersincreasingly setting their sights on the area of the enterprise wherevulnerabilities are plentiful and defenses are often weakest.