ftf-ins-f1208.pdf

File uploaded by freescaletraining on Jun 24, 2015Last modified by freescaletraining on Jun 25, 2015
Version 2Show Document
  • View in full screen mode

This session will provide an in-depth look at the trust architecture and other security features of the i.MX applications processor family. The presenter will describe the steps involved in enabling these security features which include code signing and the fuse generation tool. The session with include a deep dive into the architectural design and adaptation of CST for HSM solution, trace through the authentication process involved in secure signed boot and encrypted boot methods including fast authentication and will also explore demo signed boot (including HSM scenario) and encrypted boot. We will also touch on additional topics such as HAB API, RNG instantiation and SRK revoke methodology.

Attachments

Outcomes