Designing Secure Bootloaders

In this highly interactive course we transform an existing bootloader into a secure bootloader. We interleave compact theory sessions with hands on exercises and discussion sessions. Case studies are based on public attacks, selected based on our 15 years of experience in evaluating secure bootloaders.