Главная
Study mode:
on
1
Intro
2
About me
3
About this presentation
4
FOSS OTA updaters
5
OTA updater requirements
6
OTA classification 2
7
Double-copy OTA
8
XIP: execute in place
9
XIP advantages
10
XIP obstacles
11
OTA and XIP: Same goals...
12
sharper underwater rocks
13
Userspace OTA
14
RAM disk (initrd) OTA
15
Bootloader OTA
16
Trustzone OTA (ARM)
17
Conclusions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore secure update strategies for memory-constrained XIP (eXecute In Place) systems in this 31-minute conference talk. Delve into the challenges and solutions for updating XIP Linux systems, which allow code execution directly from flash memory without RAM copying. Learn about the renewed interest in XIP Linux for IoT devices, its memory optimization benefits, and low-power capabilities. Discover various OTA (Over-The-Air) update approaches, including userspace, RAM disk, bootloader, and TrustZone methods. Gain insights into overcoming obstacles in implementing secure updates for XIP systems, with real-world examples provided to illustrate practical applications.

Secure Updates for Memory Constrained XIP Systems

Linux Foundation
Add to list