What are you looking for?
Secure Bootloader Design Training
Learn how to fix common security mistakes in bootloader implementation through hands-on exercises.
Training at a Glance
Designing Secure Bootloaders
Most embedded devices have strong requirements for the integrity of the code running on the platform. Attackers are adept at finding new ways to compromise these systems. A robust, secure boot implementation that ensures software integrity is essential, and the implementation presents a major challenge. Several attacks on widely deployed embedded devices received high-profile media attention, exposing manufacturers to lost revenue, liability claims, and brand damage.
This training helps architects, designers, and developers of bootloaders learn how to correct and avoid common security mistakes through hands-on exercises in a virtual practice environment. Participants will identify vulnerabilities and secure an existing bootloader. By building a foundational knowledge of the design building blocks for secure boot and understanding various state-of-the-art threats, participants will gain the competencies and the confidence to tackle difficult decisions head-on.
Training Outline
- Hardware (ROM, OTP)
- Cryptography
- Confidentiality, integrity, and authenticity
- Cryptographic schemes
- Symmetric versus asymmetric crypto
- Bootloader code
- Product lifecycle
- Analyzing a bootloader
- Assumptions and logical flaws
- Software flaws
- Fault injection simulator exercises
- Software flaws, source code review, and writing a secure bootloader
- Hardware attacks
- Fault injection attacks
- Combined attacks
- Countermeasures
- Fault injection simulator exercises
- Identify single points of failure and harden a secure bootloader
Related Trainings
Interested in this service? Reach out to learn more.