Designing Secure Bootloaders

Most embedded devices have strong requirements on the integrity of the code running on the platform. Attackers are finding new ways to compromise these systems and a robust secure boot implementation that ensures the software integrity is considered essential. However, implementing a robust secure boot is a major challenge. Several attacks of widely deployed embedded devices got high profile media attention, exposing manufacturers to lost revenue, liability claims and brand damage. This is the first course aimed at developers of secure  bootloader and is based on Riscure over 15 years of evaluating bootloaders.