Secure Boot Overview

  Рет қаралды 20,189

Microchip Developer Help

Microchip Developer Help

Күн бұрын

Пікірлер: 10
@wfliu7609
@wfliu7609 Жыл бұрын
Very clear description for Secure BOOOT with HSM, Thanks MacroChip :)
@imtiyajshaikh9854
@imtiyajshaikh9854 Жыл бұрын
Very helpful. Simple and lucid explaination
@wwolfram33
@wwolfram33 4 ай бұрын
@9:10 Some steps here might be helpful to understand - For example: the Public Key is applied to the HASH to create a signature, and this signature is compared to the signature created by the Private Key of the HSM (I assumed a trusted device)? That does not seem correct. Rather, it seems that the signature created by the HSM (using its private key) needs to be 'decrypted' by the public key then compared to the HASH calculated from the desired FW to be run. If these are equal, then we know the FW has integrity and can be trusted.
@MicrochipDeveloperHelp
@MicrochipDeveloperHelp 3 ай бұрын
Hi there, thanks for your comment! In secure boot, the private key in the HSM creates the signature. The public key is then used on the device to verify it. The public key "decrypts" the signature to get the original hash that was signed. The system compares this hash with the one it generates from the firmware. If both hashes match, it means the firmware is authentic and safe to run. The public key doesn’t create the signature-it checks that the signature is valid by revealing the original hash. This ensures the firmware hasn't been tampered with. Hope this helps!
@wwolfram33
@wwolfram33 3 ай бұрын
@@MicrochipDeveloperHelp Thanks!
@mallninja9805
@mallninja9805 4 ай бұрын
@1:30 "Secureboot ensures that only trusted and authentic firmware runs on the embedded system" - trusted by whom? By what definition of "authentic"?
@hatman-rc2vc
@hatman-rc2vc Ай бұрын
not only firmware, it also check integrity of kernel and other components using hash values, and not only what runs on "embedded system", but the entire "system".
@DrInfiniteExplorer
@DrInfiniteExplorer 2 жыл бұрын
Does Microchip have a statement or philosophy or similar about secureboot and the right to repair (for example)? It's not uncommon for IoT connected devices to only operate if they are allowed to phone home to a cloud operated server, and all instructions/reports to/from the device needs to go through said server. And it's not uncommon for such companies to go out of business and/or pull their services, which leaves customers with essentially bricked expensive devices. Has Microchip thought about these scenarios? Are there any guidelines one can follow to deal with this sort of things, either from the perspective of a service provider, or from the perspective of a consumer? Are the two concerns mutually exclusive by nature?
@edwardmacnab354
@edwardmacnab354 Жыл бұрын
I see that they had no reply--very concerning
@mikeTheH
@mikeTheH 10 ай бұрын
​@@edwardmacnab354little late to the game here I know. At this point no answer is your answer. Assume the worst. I know I have.
Automotive Devices Security Architecture
26:53
Embedded Safety & Security
Рет қаралды 12 М.
Introduction to Secure Boot
21:56
Texas Instruments
Рет қаралды 885
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
Что-что Мурсдей говорит? 💭 #симбочка #симба #мурсдей
00:19
Roots of Trust Overview
11:19
Microchip Developer Help
Рет қаралды 4,4 М.
Beyond Security: The Importance of Data Resiliency 2
28:07
Abrahams Consulting LLC
Рет қаралды 47
UEFI Linux Secure Boot Kernel Signing and Verification demo
32:08
Sameer Pasha
Рет қаралды 38 М.
What is Embedded Systems and the Roadmap
43:14
Embedded Systems, in Pyjama!
Рет қаралды 15 М.
UEFI Secure Boot in U-Boot - Grant Likely, Arm
38:08
The Linux Foundation
Рет қаралды 8 М.
A tour of the ARM architecture and its Linux support
46:34
linux conf au 2017 - Hobart, Australia
Рет қаралды 127 М.
Secure Boot: What Is It, and Do I Need It? - Fabio Tranchitella, Northern.tech
40:51
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН