Secure Boot on the i.MX6 – Part 3

2020-05-27T16:56:56+01:00

Secure Boot on the i.MX6 – Part 3 Secure Boot on the i.MX6 – Part 3 Secure Boot on the i.MX6 – Part 3 In part 1 of our series looking at secure boot on the i.MX6, we examined the process itself in detail. Leveraging the hardware and authentication were covered extensively in part 2. And we have top tips on the secure boot process to help you get through it as smoothly as possible in this final instalment – so read on… Top Tips for Secure Boot on the i.MX6 Our top 5 tips for a successful secure boot on the i.MX6 are: (Sounds obvious, but) Make your process secure Keep your encryption strong Check your code Authenticate as much as [...]

Secure Boot on the i.MX6 – Part 32020-05-27T16:56:56+01:00

Secure Boot on the iMX6 – Part 2

2020-05-27T16:56:45+01:00

Secure Boot on the i.MX6 - Part 2 Secure Boot on the i.MX6 - Part 2 With embedded systems safety such a hot topic right now, we’re looking at the secure boot on the i.MX6 - one of electronics’ most popular processors. Part one was really an introduction to the secure boot process, examining it in detail. Here, in the second instalment of our 3-part series, we cover managing the hardware, the pitfalls of the secure boot process, and authentication. Secure Boot on the i.MX6 – Leveraging the Hardware It’s a suite of hardware - you have secure storage, you have one-time storage, you have hardware-accelerated cryptography. Algorithms can be hardware-accelerated which combine to make a speedy and secure boot process. Part [...]

Secure Boot on the iMX6 – Part 22020-05-27T16:56:45+01:00

Secure Boot on the iMX6 – Part 1

2020-05-28T09:36:26+01:00

Secure Boot on the iMX6 - Part 1 Secure Boot on the i.MX6 - Part 1 With the proliferation of IoT – spanning just about everything from smart cities to hardware devices to wireless jewellery – the need to prioritise information security in secure embedded systems has never been greater. The secure boot process is one of the foundation stones of software development best practice. It’s a complex, necessary part of your application program’s anti-malware fortress. In this 3-part series, we’re taking an in-depth look at the secure boot protocol, and will also tell you our top tips for executing secure boot on one of the most popular processors in electronics – the i.MX6. What is Secure Boot? Secure boot is a [...]

Secure Boot on the iMX6 – Part 12020-05-28T09:36:26+01:00