Hands-On Workshop: Achieving End-to-End Security Starting with i.MX RT and Secure Boot

キャンセル
次の結果を表示 
表示  限定  | 次の代わりに検索 
もしかして: 

Hands-On Workshop: Achieving End-to-End Security Starting with i.MX RT and Secure Boot

Hands-On Workshop: Achieving End-to-End Security Starting with i.MX RT and Secure Boot

Secure designs begin with a security model consisting of policies, an understanding of the threat landscape and the methods used to enforce physical and logical security. To protect firmware execution given today’s threat landscape, there must be a policy to only allow execution of authenticated firmware. The methods used to enforce this policy rely on MCU security technology to create a protected boot flow. The boot firmware can contain public key cryptography to authenticate application code. In addition to these components integrated in the end device, there are tools and steps that must be taken in the manufacturing environment using manufacturing hardware for code signing and host programs for provisioning. Join this session to explore the design and implementation of a secure boot with i.MX RT.

ラベル(1)
タグ(2)
添付
評価なし
バージョン履歴
最終更新日:
‎04-01-2019 01:22 PM
更新者: