Submitted:
15 February 2025
Posted:
18 February 2025
You are already at the latest version
Abstract
Keywords:
Introduction
- A. UEFI (Unified Extensible Firmware Interface)
- 1. Overview of UEFI and its Role in Booting Systems
- Support for large disk sizes: Unlike BIOS, which is limited to addressing up to 2.2 TB of storage, UEFI can handle disks larger than 2 TB using the GUID Partition Table (GPT) format.
- Faster boot times: UEFI is designed to optimize the boot process, enabling faster startup times by initializing hardware more efficiently.
- Graphical interface: UEFI supports a graphical user interface (GUI) that provides a more userfriendly experience compared to the text-based interface of traditional BIOS.
- Secure Boot: UEFI introduces Secure Boot, a security feature that ensures only trusted and signed bootloaders and firmware can run during the boot process, protecting the system from bootkits and rootkits.
- 2. Importance of Security in UEFI Updates
- System Integrity: UEFI updates typically include bug fixes, feature enhancements, and security patches. If these updates are compromised, malicious actors could introduce vulnerabilities that impact the entire system’s integrity. For example, an attacker could modify the UEFI update process or inject malicious code that compromises the system on boot.
- Firmware Attacks: Because UEFI operates at a low level, firmware vulnerabilities can be exploited by attackers to run persistent malware that survives even operating system reinstallation or hard drive formatting. This is a significant concern, as the ability to update firmware securely ensures that attackers cannot exploit outdated or vulnerable firmware.
- Trust and Authentication: A major security concern in UEFI updates is the ability to trust the source of the update. Without proper authentication mechanisms, an attacker could impersonate a trusted vendor and deliver a malicious update, potentially introducing malware or backdoors into the system. Ensuring that firmware updates are from legitimate, trusted sources is critical to preventing such attacks.
- Supply Chain Attacks: Another key risk associated with UEFI updates is the possibility of supply chain attacks. Malicious actors could compromise the distribution or update process, injecting malicious code into firmware updates before they even reach the end user. Securing the update process, including encryption and digital signature verification, is necessary to mitigate this risk.
- Secure Boot and Capsule Updates: UEFI systems often incorporate Secure Boot, a feature designed to prevent unauthorized or unsigned firmware from being loaded. Ensuring the authenticity and integrity of firmware updates, including those delivered via UEFI capsules, is crucial to maintaining the effectiveness of Secure Boot.
- 1. Definition of UEFI Capsule Updates
- Header: This includes metadata about the capsule, such as its size, version, and type of update (e.g., firmware or configuration).
- Update Data: The actual binary data for the firmware update, which can be the firmware image itself or other data needed for the update process.
- Digital Signatures: To ensure the authenticity and integrity of the capsule, it often includes digital signatures and cryptographic checks, verifying that the capsule has not been tampered with and comes from a trusted source.
- 2. Purpose of Capsule Updates in Firmware Updates
- Simplified Update Process: Capsule updates standardize the delivery of firmware updates across systems. By encapsulating the update into a structured format, the system can easily process and apply the update, ensuring consistency and reducing the complexity of the update process. This simplifies the firmware update mechanism for both hardware manufacturers and system administrators.
- Security and Integrity of Updates: Capsule updates are designed with security in mind. The inclusion of digital signatures and cryptographic hashes ensures that the firmware update is legitimate and has not been tampered with during transmission. This prevents the injection of malicious code into the firmware, which could otherwise compromise the entire system. UEFI capsule updates also allow for rollback protection, ensuring that a system can return to a known good state in case of a failed update.
- Remote and Over-the-Air (OTA) Updates: One of the key advantages of UEFI capsule updates is the ability to deliver firmware updates remotely, without requiring physical access to the system. This is particularly important for devices deployed in the field, such as servers, IoT devices, and embedded systems, where remote management is essential for maintenance and security. Capsule updates allow firmware to be delivered securely and applied automatically, ensuring the device stays up-to-date even when it is not directly accessible.
- System Reliability and Stability: Keeping firmware up to date is crucial for maintaining system stability. Firmware updates through UEFI capsules can address issues such as hardware bugs, compatibility problems, and performance optimizations. By applying updates via capsules, manufacturers can ensure that devices are running the most reliable version of firmware, which minimizes the risk of errors or system failures.
- Support for Secure Boot: Secure Boot is a security feature in UEFI that ensures only signed, trusted firmware and bootloaders are allowed to execute during system startup. UEFI capsule updates are tightly integrated with Secure Boot, as they can only be applied if the update is verified as being from a trusted source. This prevents attackers from replacing firmware with malicious versions that could bypass operating system-level security.
- Firmware Rollback and Recovery: UEFI capsule updates can include mechanisms for rollback, allowing the system to revert to a previous firmware version if an update fails or causes issues. This ensures that even in the event of an unsuccessful update, the system remains operational and can recover to a known working state, reducing downtime and improving system resilience.
The Need for Authentication and Integrity in UEFI Capsule Updates
- A. Security Risks
- 1. Risk of Malicious Code Injection in Firmware Updates
- Persistence of Malware: Malicious code inserted into the firmware can remain active even after the operating system is reinstalled or the hard drive is wiped, as firmware operates outside the operating system layer. This allows attackers to maintain persistent control over the system, often making it much more difficult to detect and remove the malware.
- Rootkits and Bootkits: One of the most dangerous forms of malicious code that can be injected into firmware is a rootkit or bootkit. These forms of malware can modify the system’s boot process, gaining control before the operating system even loads. By tampering with UEFI firmware via a compromised update, attackers can ensure that their malicious code runs early in the boot sequence, bypassing traditional security measures like antivirus software and firewalls.
- Remote Code Execution: Malicious code inserted into a firmware update could enable remote code execution (RCE), giving attackers the ability to execute arbitrary commands on the compromised system. This can lead to unauthorized access to sensitive information, further exploitation of the device, or use of the device in botnets or other malicious networks.
- Data Corruption or Loss: In some cases, the injected code may not necessarily be designed to take control of the system but to corrupt or destroy data, affecting critical files, system configurations, or other important resources that could disrupt operations or cause permanent data loss.
- 2. Impact of Compromised Firmware on System Stability and Security
- System Instability: A corrupted or tampered firmware update can destabilize a system’s operation. This could manifest in unpredictable behavior such as system crashes, freezes, hardware malfunctions, or failure to boot. These instabilities are often difficult to trace, as they occur below the operating system layer, potentially leading to prolonged downtime or a complete system failure.
- Loss of System Control: If firmware is compromised, attackers may gain the ability to bypass operating system-level security mechanisms, such as user authentication and file access controls. This gives attackers an elevated level of control over the system, enabling them to alter critical configurations, install backdoors, and disable security features, making the system even more vulnerable to further attacks.
- Exposure to Additional Attacks: Compromised firmware can expose the system to a variety of other attacks, as the attacker can manipulate system processes at a fundamental level. For instance, an attacker could disable security features like Secure Boot or modify the UEFI environment to allow unsigned code to run during boot, effectively bypassing all protections against unauthorized access.
- Vulnerability to Exploits: If the firmware contains vulnerabilities—either due to improper updates or malicious modifications—attackers can exploit these weaknesses to escalate their privileges or launch further attacks on the system. Vulnerable firmware could serve as a gateway to additional exploits, expanding the attack surface and increasing the potential for system-wide compromise.
- Irreparable Damage: In some extreme cases, if the firmware update mechanism is compromised and the system cannot recover from a faulty update (e.g., due to lack of rollback capabilities or secure recovery mechanisms), the damage can be irreversible. This could require a full hardware replacement or other costly recovery processes, particularly if critical components like system ROM or hardware keys are affected.
- 1. Ensuring the Authenticity of Update Sources
- Risk of Impersonation: Without robust mechanisms to authenticate the update source, attackers may spoof the vendor’s server or firmware distribution channels, sending malicious updates to systems. These counterfeit updates could carry malicious payloads that compromise the system’s security.
- Vendor Trust Chain: The security of UEFI updates heavily relies on the trustworthiness of the firmware vendors. If any part of the supply chain (such as the firmware distribution platform, firmware signing keys, or hardware manufacturers) is compromised, attackers could insert malicious updates into the process without detection.
- Challenges in Secure Distribution: Even with encryption, ensuring that updates are only provided by the correct vendor and that those updates are genuine and untampered is an ongoing challenge. The need for strong identity management, digital signatures, and proper certificate management becomes evident in establishing trust between the vendor and the system.
- Solution Strategies:
- Digital Signatures and Public Key Infrastructure (PKI): UEFI capsule updates should be signed with strong cryptographic signatures to ensure authenticity. Only updates signed with the trusted keys of the vendor should be accepted.
- Secure Channels: Updates should be transmitted over secure, encrypted channels (such as HTTPS or other secure protocols) to prevent interception and impersonation of update sources.
- Certificate Authorities (CAs): Relying on trusted third-party certificate authorities can help ensure the authenticity of update sources by validating digital certificates and cryptographic keys.
- 2.Protecting Against Unauthorized or Counterfeit Updates
- Compromised Update Distribution: An attacker might gain access to a legitimate update server and replace an authentic firmware update with a counterfeit or malicious version. This is especially risky if the update server lacks strong security controls, such as multi-factor authentication or vulnerability scanning.
- Malicious Firmware Redistribution: Attackers could redistribute previously legitimate firmware updates, modifying them slightly to insert malware or backdoors, thereby evading detection while delivering malicious payloads.
- Rogue Firmware Versions: Unauthorized third parties may attempt to deliver their own firmware updates that masquerade as legitimate updates, exploiting any weaknesses in the firmware verification process.
- Solution Strategies:
- Enforce Strict Authentication: UEFI firmware should only accept updates signed by a trusted vendor or its authorized representatives. By using secure key management practices, systems can block updates that come from unknown or unauthorized sources.
- Version Verification: Firmware versions should be strictly controlled. Systems can verify the update’s version and ensure that it has been authenticated with a secure signature to prevent unauthorized updates.
- Multi-Factor Authentication (MFA): Using multi-factor authentication for firmware update systems can further ensure that only authorized personnel can access or distribute legitimate firmware updates.
- 3.Preventing Tampering During the Update Process
- Man-in-the-Middle (MitM) Attacks: If the communication channel used to transmit the firmware update is not properly secured, attackers could intercept and modify the capsule during transmission. This could include altering the update’s binary code or injecting malicious payloads into the firmware update process.
- Update File Integrity: Even if the update is correctly signed, attackers may attempt to alter the update file itself by exploiting vulnerabilities in the update process or access to the local storage device.
- Firmware Update Process Exploits: Some systems may have flaws in the firmware update code, allowing attackers to bypass integrity checks and apply tampered updates without detection. In these cases, attackers could modify the UEFI capsule update to subvert the intended firmware functionality.
- Solution Strategies:
- End-to-End Encryption: Using secure communication protocols like HTTPS or VPNs ensures that firmware updates are protected against tampering during transmission. The encryption helps to safeguard the update from being intercepted or altered while in transit.
- Integrity Checking: UEFI firmware should perform integrity checks on the capsule update before applying it, including verifying the update’s cryptographic signature and running checksum or hash verification to ensure that no modifications have been made during transmission or storage.
- Secure Boot Integration: Secure Boot should be used to enforce that only signed, trusted firmware can be executed. By tightly integrating Secure Boot with the UEFI update process, systems can prevent unauthorized or tampered updates from being applied during boot time.
- Rollback Protection: Implementing rollback protection ensures that if an update is found to be tampered with or faulty, the system can revert to a previous secure state, thereby preventing the deployment of potentially harmful updates.
- A. Public Key Infrastructure (PKI)
- 1. Role of PKI in Authenticating UEFI Capsule Updates
- Public and Private Key Pairs: PKI uses asymmetric cryptography, where a private key is used to sign the firmware update (UEFI capsule), and the corresponding public key is used to verify the signature. Only the holder of the private key (the trusted vendor) can sign a valid update, while anyone with the public key can verify its authenticity.
- Trust Chain: PKI enables the creation of a “chain of trust” between the update source and the system. Digital certificates issued by trusted Certificate Authorities (CAs) allow the system to verify that the public key used to sign the update belongs to a legitimate vendor or manufacturer. In the context of UEFI, PKI ensures that the update process is secure by making it difficult for attackers to impersonate a trusted vendor, preventing unauthorized or malicious updates from being applied.
- 2. Use of Digital Signatures to Verify the Integrity and Origin of Updates
- Integrity Verification: The system verifies the integrity of the update by ensuring that the data has not been altered. If even a single byte of the update is modified, the signature verification will fail.
- Origin Verification: By verifying the digital signature, the system can confirm that the update originates from the trusted vendor or manufacturer. The system uses the corresponding public key to validate the signature and authenticate the update’s source.
- 3. How Certificates and Keys are Managed in UEFI
- UEFI Signature Database: UEFI firmware maintains a Signature Database (DB) that contains a list of trusted public keys and digital certificates from authorized vendors. This database is used to authenticate UEFI capsule updates and ensure that only updates signed with trusted keys are accepted.
- Platform Key (PK): The Platform Key is a key used to establish the initial trust of the UEFI firmware. The PK is critical for configuring Secure Boot settings and for enabling the use of other keys for signing UEFI updates.
- Certificate Authorities (CAs): Trusted CAs issue digital certificates used to sign updates. UEFI systems verify the authenticity of these certificates to ensure that the update was signed by a valid and trusted entity.
- B.Digital Signatures
- 1. The Process of Signing a Capsule Update
- Update Creation: The vendor or authorized entity creates the UEFI capsule update, which includes both the firmware update and any necessary metadata (e.g., version, update description).
- Hashing the Update: A cryptographic hash of the update content (typically using SHA-256 or another secure hashing algorithm) is generated. This hash represents the content of the update in a condensed, fixed-size form.
- Signing the Update: The generated hash is encrypted using the private key of the vendor or trusted entity. This encrypted hash is the digital signature and is included within the UEFI capsule update package.
- Distribution: The signed UEFI capsule update is then distributed to the system for installation. The digital signature allows the receiving system to verify that the update has not been altered and originates from a trusted source.
- 2. Verification of Signatures by UEFI Firmware
- Extracting the Public Key: The UEFI firmware first retrieves the public key of the vendor or trusted entity from the system’s Signature Database or another trusted repository.
- Decrypting the Signature: Using the public key, the system decrypts the digital signature included in the UEFI capsule update, revealing the original hash value of the update.
- Hash Comparison: The firmware then generates a hash of the update content itself and compares it with the decrypted hash. If the two hashes match, the update is verified as both authentic and untampered with. If they do not match, the update is rejected.
- 3. Ensuring Updates Come from Trusted Vendors or Manufacturers
- Trusted Certificate Authorities (CAs): The public key used to verify the update’s signature is often signed by a trusted CA. The system checks the authenticity of the CA’s certificate, ensuring that the update source is reputable and recognized by the UEFI environment.
- UEFI Secure Boot Integration: Secure Boot ensures that only signed bootloaders and firmware can be executed. UEFI capsule updates must be signed with valid keys that are included in the Secure Boot database, adding an additional layer of trust.
- C.Secure Boot and Secure Update Mechanisms
- 1. Role of Secure Boot in Enforcing Signature Verification
- Signature Enforcement: Secure Boot ensures that only UEFI firmware and bootloaders that are signed with trusted keys can execute during the boot process. When a UEFI capsule update is applied, Secure Boot verifies that the update’s signature matches a trusted key in the Signature Database.
- Preventing Unauthorized Updates: By integrating Secure Boot with the UEFI update process, the system blocks the application of unsigned or tampered updates, protecting the system from potential threats that may attempt to load malicious firmware.
- 1. Ensuring that Only Signed Updates Are Allowed to Execute
- Bootloader and Capsule Validation: Secure Boot checks the validity of bootloaders, operating systems, and UEFI capsule updates before allowing them to run. If the signature is invalid or the update has been tampered with, the firmware will prevent the system from booting.
- 3. Implementation of Trusted Platform Module (TPM) for Additional Security
- Hardware-Based Security: TPM is a hardware security module that stores cryptographic keys, certificates, and other security-related information in a tamper-resistant environment. This makes it much harder for attackers to alter the UEFI update process or inject malicious code.
- Trusted Execution: TPM can be used to store and validate cryptographic keys and signatures used in the UEFI update process, ensuring that only updates signed with trusted keys are applied. Additionally, TPM can provide attestation by validating that the system firmware is in a known, secure state, further protecting the update process from tampering.
Integrity of UEFI Capsule Updates
- A. Hashing and Checksums
- 1. Role of Hashing Algorithms (e.g., SHA-256) in Ensuring Integrity
- Data Integrity Verification: Before transmission or installation, the UEFI capsule update is hashed, and the hash value is either stored or included in the update package. During the verification process, the recipient system can re-compute the hash of the received update and compare it to the original hash. If the hashes match, the update is considered intact and untampered with. If they differ, it indicates that the update has been altered or corrupted, and the installation is aborted.
- Tampering Detection: If an attacker attempts to alter the contents of the firmware update (e.g., by injecting malicious code), the hash will change, and the system will detect the discrepancy. This ensures that any unauthorized modifications are caught before the update is installed.
- Efficient Integrity Checking: Hashing algorithms like SHA-256 are designed to be computationally efficient, making it feasible to perform integrity checks even for large firmware files.
- 2. Comparing File Hashes to Detect Tampering
- Generate Original Hash: When the update is created, the vendor generates a cryptographic hash (e.g., SHA-256) of the entire update package.
- Transmit and Compare: When the update is received by the system, the firmware regenerates the hash of the received capsule and compares it with the original hash provided by the vendor (either within the update package or stored securely). If the two hashes match, the update is considered valid.
- Tampering Detection: If the hashes do not match, the system flags the update as tampered with and prevents it from being installed. This is a critical measure for defending against man-in-the-middle (MitM) attacks or any form of unauthorized alterations.
- 3. Methods to Check for Corruption or Unauthorized Alterations During Transmission
- Checksums in Transmission: In addition to the hash of the firmware, checksum methods can be used to verify data integrity during transmission. For example, a checksum can be calculated on the data before transmission and then re-calculated upon receipt to verify no data was altered or corrupted in transit.
- Secure Transmission Channels: Using encryption protocols like TLS/SSL (Transport Layer Security/Secure Sockets Layer) ensures that the update is transmitted over a secure channel, preventing interception and tampering. This protects against MitM attacks where an attacker could modify the update before it reaches the target system.
- Redundant Hash Verification: To improve integrity checking, hashes can be stored in multiple places, including separate files or encrypted storage. This provides a layer of protection in case an attacker compromises one location.
- B.Verification of Update Packages
- 1. Pre-Installation Verification by the UEFI Firmware
- Signature and Integrity Verification: UEFI firmware checks both the digital signature and the hash of the capsule update. The digital signature confirms that the update comes from a trusted source (as discussed in the “Authentication” section), and the hash ensures the integrity of the update (no tampering or corruption).
- Validation of Capsule Metadata: The firmware verifies not just the content of the update but also its metadata, such as version numbers, update descriptions, and required configurations, to ensure compatibility and safety during installation.
- Secure Validation Paths: The UEFI firmware often works in conjunction with Secure Boot to enforce that only signed, trusted updates are verified before installation, ensuring the update package has not been tampered with.
- 2. Ensuring Integrity During the Update Installation Process
- Progressive Integrity Checks: The firmware can implement multiple layers of checks throughout the update process. As the update is written to the system, intermediate integrity checks ensure that data is correctly transferred to non-volatile memory (e.g.,
- flash storage) and that no corruption occurs during the installation.
- In-Memory Integrity Validation: Before committing the update to permanent storage, the system can verify the update in memory, comparing the data with its expected hash to confirm that no tampering has taken place since the last verification.
- Atomic Updates: The update process can be designed as an atomic operation, meaning that either the entire update is applied, or no update is made. This ensures that if the update is interrupted or found to be corrupt, the system will not be left in an inconsistent or broken state.
- 3. Reverting to a Safe State in Case of Integrity Violations (Rollback Protection)
- Rollback Mechanism: If the UEFI firmware detects that the update is corrupt or tampered with (for example, through failed signature verification or hash mismatch), it will not proceed with the update. Instead, it may revert to a backup copy of the firmware or the previous stable version, ensuring the system is not left in an insecure or unstable state.
- Recovery Process: In cases where the update process fails or the firmware becomes corrupted, the system can enter a recovery mode. This can involve accessing a recovery partition or using a hardware-based recovery method to restore the system to its last known good configuration.
- Redundant Firmware Images: Some UEFI systems employ dual firmware banks or redundant storage to store two copies of the firmware—one active and one backup. If a problem occurs during the update process, the system can fail back to the backup firmware to maintain system stability.
- C.Error Handling and Recovery Mechanisms
- 1. Handling Failed Updates Without Compromising System Security
- Graceful Failure: The system should abort the update process if any integrity checks fail, without installing incomplete or corrupted firmware.
- Log Files and Debugging: The system should generate detailed log files in case of a failed update, providing diagnostics that can help identify the root cause and assist in recovery procedures without putting the system at risk.
- 2. Use of Recovery Modes and Rollback to the Previous Firmware Version
- Rollback to Known Safe Firmware: Many UEFI implementations include rollback protection that enables the system to restore the previous, known-good firmware version. This prevents the system from being left in an unusable or vulnerable state due to an update failure.
- Automatic Recovery Mode: In case of failure during firmware updates, the system can enter an automatic recovery mode, using a pre-installed backup or external recovery tools to restore system functionality.
- 3. Role of Redundant Firmware Stores for Safe Updates
- Dual-Firmware Architecture: Systems may store two firmware images: one active and one backup. In the event of an update failure or integrity violation, the system can boot from the backup firmware image while troubleshooting the failure or applying a correct update.
- Automated Failover: Some systems are designed with automated failover capabilities, ensuring that the firmware always returns to a stable state, regardless of the update’s success or failure.
Conclusion
- A. Summary of Key Points
- 1. The Importance of Secure Authentication and Integrity in UEFI Capsule Updates
- 2. Effective Practices to Mitigate Risks in the Update Process
- Public Key Infrastructure (PKI) and digital signatures provide robust authentication of update sources.
- Secure Boot and TPM (Trusted Platform Module) ensure that only verified updates are allowed to execute, adding an extra layer of protection.
- Hashing algorithms (e.g., SHA-256) and checksums verify that updates have not been tampered with or corrupted during transmission.
- Pre-installation verification by UEFI firmware ensures the update is legitimate and intact before it is applied.
- Rollback protection ensures that the system can revert to a stable state if an update fails or is detected as malicious.
- B.Future Trends and Improvements
- 1. Emerging Technologies for Improving UEFI Update Security
- Blockchain Technology: Blockchain could be used for a decentralized, immutable ledger of firmware updates, ensuring traceability, transparency, and accountability of updates. This would make it extremely difficult for attackers to modify or forge updates without detection.
- Secure Firmware Distribution Networks: As updates become more complex, the use of secure, distributed update networks powered by advanced encryption could enhance both integrity and availability, ensuring updates can only be sourced from trusted nodes.
- 2. The Role of AI and Machine Learning in Detecting Anomalous Updates
- Identify anomalies: AI systems can be trained to recognize behaviors or patterns in firmware updates that deviate from the norm, flagging potentially malicious updates before they are applied.
- Threat Intelligence Integration: Machine learning models can integrate threat intelligence data to stay ahead of emerging attack techniques, enabling systems to identify updates containing known threats or vulnerabilities.
- 3. Anticipating Future Threats and Adapting Security Measures Accordingly
- Firmware Supply Chain Attacks: Attacks that compromise the update process at the vendor level could target firmware update servers or the integrity of the distribution pipeline. Enhanced verification methods, such as multi-party verification, can help mitigate these risks.
- Advanced Persistent Threats (APT): Highly sophisticated, long-term threats could target firmware updates in stealthy ways. Continuous monitoring, AI-driven anomaly detection, and an evolving framework of trusted platforms (including machine learningenhanced hardware) will help defend against such advanced threats.
Final Thoughts
References
- Evangelista, Francesco. “Automatic Extraction of Exploitation Primitives in UEFI.” PhD diss., Politecnico di Torino, 2023.
- Sarvepalli, Vijay. “Securing UEFI: An Underpinning Technology for Computing.” (2023): 15.
- Bulusu, Mallik, and Vincent Zimmer. “White Paper UEFI Plugfest 2015-Challenges for UEFI and the Cloud.” (2015).
- Shaik, Y. (2024). Securing Firmware updates: Addressing security challenges in UEFI capsule update mechanisms. Researchgate.
- Younus Shaik. (2024). Securing Firmware updates: Addressing security challenges in UEFI capsule update mechanisms. Researchgate. https://www.researchgate.net/publication/382447021_Securi ng_Firmware_Updates_Addressing_Security_Challenges_in_UEFI_Capsule_Update_Me chanisms.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
