Training at a Glance

Vector illustration of an audience watching an instructor on screen

Format

  • Classroom group training
  • Interactive exercises and quizzes

Vector illustration of 3 people serving as an audience

Audience

  • Architects
  • Designers
  • Developers of bootloaders

Vector illustration of a stopwatch timer

Duration

  • 4 courses
  • 2 days

Vector illustration of certificate or diploma

Outcomes

  • Identify and understand threats
  • Analyze trade-offs and make decisions
  • Implement and harden bootloaders

Designing Secure Bootloaders

Most embedded devices have strong requirements for the integrity of the code running on the platform. Attackers are adept at finding new ways to compromise these systems. A robust, secure boot implementation that ensures software integrity is essential, and the implementation presents a major challenge. Several attacks on widely deployed embedded devices received high-profile media attention, exposing manufacturers to lost revenue, liability claims, and brand damage.

This training helps architects, designers, and developers of bootloaders learn how to correct and avoid common security mistakes through hands-on exercises in a virtual practice environment. Participants will identify vulnerabilities and secure an existing bootloader. By building a foundational knowledge of the design building blocks for secure boot and understanding various state-of-the-art threats, participants will gain the competencies and the confidence to tackle difficult decisions head-on.

Training Outline

  • Anatomy of a bootloader
    • Design requirements
    • Implementation requirements
    • Secure chip platform, secure software, and cryptographic primitives
  • Threat analysis and risk assessment fundamentals
    • Asset, threat, vulnerability, practical security, and risk

Interested in this service? Reach out to learn more.

Hong Kong, China