How to secure your application using a serial loader and secure boot manager

The pragmatics of designing a boot manager and loader are somewhat difficult to discuss because there can be so many different requirements placed on it, e.g. the mechanism for getting the new application into the MCU, for some, it will be through the serial peripheral of the MCU, for others, it might be Over the Air (OTA). The capability of updating the firmware, especially for IoT devices makes the product vulnerable if there isn’t any mechanism to prohibit unauthorized reprogramming and reconfiguring of the system.

Adding the functionality of validating the source of the code via an encryption/decryption layer is the first step to make the boot manager secure. A secure boot manager can itself reprogram the firmware running on an embedded device or system, when the transferred content by the loader is encrypted and validated by an authenticated authority.

In this session, we will explore in practice the use of a combined secure boot manager and reference serial loader for securing your application. Working with a secure boot manager and serial loader can be somewhat tricky, but with our tips and tricks, you should be well on your way to enable a successful and secure dynamic software update mechanism for your MCU in the field.

Watch webinar on-demand

很抱歉,该页面尚未翻译成中文。

如果您有任何问题,请联系我们的中国团队

We do no longer support Internet Explorer. To get the best experience of iar.com, we recommend upgrading to a modern browser such as Chrome or Edge.