Designing Secure Bootloaders - Part 1: Software Developers

8h -10h

Most embedded devices have strong requirements on the integrity of the code running on the platform. Attackers are finding new ways to compromise these systems and a robust secure boot implementation that ensures the software integrity is considered essential. However, implementing a robust secure boot is a major challenge. Several attacks of widely deployed embedded devices got high profile media attention, exposing manufacturers to lost revenue, liability claims, and brand damage. 

Sneak peak

Who is this training for?

If you recognize yourself in the following statements, this training is for you:

  • You design embedded devices and are concerned about the integrity of your software;
  • You develop bootloaders and would like to add security;
  • You plan to design or add secure boot to an existing solution;
  • You designed/implemented secure boot and would like to improve its security;
  • You are a security architect of embedded devices which need to pass industry certification

What will you learn in this course?

We focus on the early stages of boot for three reasons: first, these stages are critical for the overall solution, second early boot stages are custom-designed for each platform and third there are standard techniques for the later stages of boot such as DM-verity for Linux Based Solutions:

  • Essential building blocks for a secure bootloader ;
  • Design choices for building a secure boot
  • Integration of functional requirements in decisions
  • Crypto do and don’t
  • Common software vulnerabilities
  • Fault Injection
  • Side Channel Analysis