How to secure your application using a serial loader and secure boot manager

The pragmatics of designing a boot manager and loader are somewhat difficult to discuss because there can be so many different requirements placed on it, e.g. the mechanism for getting the new application into the MCU, for some, it will be through the serial peripheral of the MCU, for others, it might be Over the Air (OTA). The capability of updating the firmware, especially for IoT devices makes the product vulnerable if there isn’t any mechanism to prohibit unauthorized reprogramming and reconfiguring of the system.

Adding the functionality of validating the source of the code via an encryption/decryption layer is the first step to make the boot manager secure. A secure boot manager can itself reprogram the firmware running on an embedded device or system, when the transferred content by the loader is encrypted and validated by an authenticated authority.

In this session, we will explore in practice the use of a combined secure boot manager and reference serial loader for securing your application. Working with a secure boot manager and serial loader can be somewhat tricky, but with our tips and tricks, you should be well on your way to enable a successful and secure dynamic software update mechanism for your MCU in the field.

Watch webinar on-demand

Det här innehållet finns tyvärr inte på svenska.

Vår webbplats finns främst på vårt koncernspråk engelska, förutom det innehåll för investerare som vi är lagstadgade att kommunicera på svenska. Vi rekommenderar att du besöker vår globala webbplats på engelska för att få en bättre upplevelse.

Vi stöder inte längre Internet Explorer. För att få bästa möjliga upplevelse av rekommenderar vi att du uppgraderar till en modern webbläsare som Chrome eller Edge.