Software integrity and data confidentiality: Establishing secure boot and chain of trust on i.MX processors
High-performance, power-efficient processors now can bring “smart” capabilities to a rapidly growing range of connected devices. These capabilities are driving innovation in embedded systems for automotive, medical, aerospace, wearables, IoT, industrial IoT and many other applications.
But as smart connected systems are deployed more widely, ensuring the security of these systems and the data they process is ever more critical. Checking the authenticity of software running on these remote connected devices is paramount to ensuring their security.
To achieve this, an essential best practice is to establish secure boot and chain of trust in the software running on your embedded Linux systems.
This presentation will explore this “Secure by Design” approach to software security for embedded systems using NXP i.MX processors, including:
- Defining security requirements such as maintaining software integrity and ensuring data on your devices is protected and confidential.
- How secure boot ensures only authenticated software runs on your device, protecting against the execution of malicious code.
- How establishing a chain of trust can ensure software authenticity all the way from the bootloader to user applications.
- Techniques such as verifying the bootloader on NXP i.MX processors, kernel verification, root filesystem verification, and file system integration and secure key storage.