Looking for help getting a high level understanding of an approach to embedded cybersecurity.
Right now my concept is that when we have our production firmware ready to go, we would generate an SHA3 hash on the application binary, and store that in a secure memory location.
Then upon application start, the application would create another hash over all application memory (or I guess a pre-defined start/stop address).
The something has to compare the two hashes (not sure if the cSEC module does this in hardware?). If it passes then the application can go ahead, if not then be bricked.
Does this understanding seem correct?
My system does not have a bootloader.