Secure Boot Strategies for ARM Cortex A and M Speaker: Josh Datko

After learning the consequences of not turning on secure boot at HardwareSecure.training, this talk will tell you how to implement a secure boot design. Focusing on the ARM ecosystem, specifically cortex A and M microprocessors and microcontrollers, we’ll cover the general secure boot design pattern. Then we will focus on two open-source case studies using the Xilinx Zynq 7000 running embedded Linux and the STMicro STM32F205 with a bare metal application that supports a device firmware update. Lastly, we’ll talk about the impact of adding secure boot to a design in the following lifecycle stages: hardware and firmware development, hardware validation and test, manufacturing assembly testing, supply chain security, and end-user use cases. Why:

Secure boot isn’t magic either, sometimes it doesn’t work so what’s the backup plan.

Josh is also attending


4-Day Hardware Hacking, Reversing and Instrumentation

Apr 23-Apr 26, 2018

About the speaker

Speaker
Josh Datko
Website
Cryptotronix
Twitter
@cryptotx
Josh Datko is the owner of Cryptotronix, an embedded security consultancy. As a submarine officer, he was sent to Afghanistan to ensure that the Tailiban did not develop a submarine force -- mission accomplished! He wrote a book on BeagleBones and crypto hardware which not many people have read and presented a better way to make a hardware implant at DEF CON which hopefully helped the NSA improve their spying.

See this talk


If you want to see this talk, please register for one of our training classes.

List of Trainings and Registration