Secure Boot Strategies for ARM Cortex A and M Speaker: Josh Datko
After learning the consequences of not turning on secure boot at HardwareSecure.training, this talk will tell you how to implement a secure boot design. Focusing on the ARM ecosystem, specifically cortex A and M microprocessors and microcontrollers, we’ll cover the general secure boot design pattern. Then we will focus on two open-source case studies using the Xilinx Zynq 7000 running embedded Linux and the STMicro STM32F205 with a bare metal application that supports a device firmware update. Lastly, we’ll talk about the impact of adding secure boot to a design in the following lifecycle stages: hardware and firmware development, hardware validation and test, manufacturing assembly testing, supply chain security, and end-user use cases. Why:
Secure boot isn’t magic either, sometimes it doesn’t work so what’s the backup plan.
Josh is also attending
4-Day Hardware Hacking, Reversing and Instrumentation
About the speaker
See this talk
If you want to see this talk, please register for one of our training classes.