White Papers

Trusted Boot

September 06, 2018 | BY: Steve Edwards

Download PDF

Trusted Computing: The COTS Perspective Series

In this, the second of our ongoing series of papers on the use of commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements, we take a look at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.

Trusted Computing

What does “trust” mean in an embedded module or system? Trust means no more and no less than ensuring that the system operates exactly as intended. In the context of the boot process, trust means that an embedded module only executes the boot code, operating system, and application code that it is intended to run. No more and no less. The only way to guarantee trust in this chain is to ensure that all code, from the very first instruction that a processor executes, is authentic. In other words, that the code is specifically intended by the OEM or system integrator to execute on that processor. This paper focuses particularly on establishing initial trust in the boot process and various means to do that, although many of these same techniques are also useful for extending trust to the operating system and application code.

Download the 'Trusted Boot'  white paper to learn more about:

  • Trusted Boot
  • Cryptography
  • Intel Trusted Execution Technology (TXT) and Boot Guard
  • NXP Trust Architecture for Power Architecture and Arm processors

 

Author’s Biography

Steve Edwards

Director, Secure Embedded Solutions & Technical Fellow

Steve has over 25 years of experience in the embedded system industry. He managed and co-designed Curtiss-Wright’s first rugged multiprocessor and FPGA products and was involved in the architecture, management and evangelization of the industry’s first VPX products. Steve has Chaired the VITA 65 working group and currently leads Defense Solutions’ strategic initiative in Anti-Tamper and Cybersecurity. Steve has a Bachelor of Science in Electrical Engineering from Rutgers University.

Share This Article

  • Share on Linkedin
  • Share on Twitter
  • Share on Facebook
  • Share on Google+
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright
Sales

CONTACT SALES

Contact our sales team today to learn more about our products and services.

YOUR LOCATION

PRODUCT INFORMATION

Support

GET SUPPORT

Our support team can help answer your questions - contact us today.

REQUEST TYPE

SELECT BY

SELECT Topic