SEMINAR

SECURE BOOT

BASIC CONCEPTS AND TRADEOFFS

CONTENT

The topics addressed include:

Basic concepts: Adding an electronic signature to a binary image
The root of trust: the burnt-in boot code of the SoC
Starting the bootloader
Starting the OS: More of the same
Starting applications
Overall performance consequences of secure boot
Run-time monitoring to achieve better security
Different security models or how large is my key-ring
Consequences for software update

GOALS

The purpose of this seminar is to understand how secure boot works and to provide familiarity with the concepts upon which it is based.

DURATION

This is a 1-day seminar.

TARGET AUDIENCE

This seminar is intended for system and software architects that need to understand how secure boot functions and how it impacts the system. It can also be valuable for engineering managers that wish to acquire an understanding of the topic.