Главная
Study mode:
on
1
Introduction
2
Encryption vs Signature
3
Consequences
4
Root of Trust
5
Bootloader
6
Creating keys
7
Device tree
8
Container
9
Image
10
Configuration
11
Verification
12
Root filesystem
13
Verity Setup
14
Ash Tree Setup
15
Ash Tree on Device
16
Ash Offset
17
Devicemapper
18
Boot Environment Script
19
Summary
20
Yocto
21
Conclusion
22
Questions
Description:
Explore a comprehensive guide to implementing Secure Boot from start to finish in this 49-minute conference talk. Delve into the intricacies of building a complete chain-of-trust for a platform, based on real-world experience with an i.MX6 custom board. Learn about each link in the chain-of-trust, from boot ROM to filesystem, including bootloader and kernel. Discover practical techniques for signing binaries, securing kernel booting automation within the bootloader, and implementing dm-verity and switchroot for filesystem security. Gain insights from experienced embedded Linux engineers Quentin Schulz and Mylène Josserand as they cover topics such as encryption vs. signature, root of trust, creating keys, device tree configuration, image verification, root filesystem setup, and Yocto integration. Enhance your understanding of secure boot implementation and best practices in embedded systems.

Secure Boot from A to Z - Building a Complete Chain-of-Trust

Linux Foundation
Add to list
0:00 / 0:00