Most embedded devices have strong requirements on the integrity of the code running on the platform. Attackers are finding new ways to compromise these systems and a robust secure boot implementation that ensures the software integrity is considered essential. However, implementing a robust secure boot is a major challenge. Several attacks of widely deployed embedded devices got high profile media attention, exposing manufacturers to lost revenue, liability claims, and brand damage.
If you recognize yourself in the following statements, this training is for you:
We focus on the early stages of boot for three reasons: first, these stages are critical for the overall solution, second early boot stages are custom-designed for each platform and third there are standard techniques for the later stages of boot such as DM-verity for Linux Based Solutions: