Secure Boot, Chain of Trust, and Data Protection
Secure Boot, Chain of Trust, and Data Protection
Session Description:
Secure boot is designed to protect a system against malicious code by ensuring only authenticated software runs on the device. Extending the authentication scheme from the bootloader to user space involves establishing a chain of trust. A detailed overview of existing open source solutions that can be leveraged to establish a chain of trust will be covered in this session.
In addition to software authentication, protecting user data and intellectual property can be critical in certain applications, which can be achieved by means of encryption. While readily available mechanisms in the Linux kernel such as dm-crypt/LUKS can be used for encrypting partitions, the key used to encrypt the partition needs to be protected. Learn about the various hardware-assisted options for secure key storage and takeaway the best practices based on lessons learnt from securing products on various platforms.
Akshay Bhat presenting his session at Embedded World 2019.
Photo credit: NürnbergMesse
Akshay Bhat
Have questions about secure boot, chain of trust and data protection? Feel free to reach out to Akshay directly.
Could you benefit from a no-obligation,
30-minute security services consultation?
Simply fill out the form or email us at sales@timesys.com, and we will be in touch within one business day to schedule a date and time that works for you. Or you can call us at 1.866.392.4897 (toll-free) or +1.412.232.3250.
* Denotes required field.