Secure-Boot
Secure-Boot
CONTENTS
Abstract 01
Introduction 01
Conclusion 07
2
MTH | Whitepaper
Abstract
Security continues to be an increasingly important concern in the design of modern systems. This
white paper is based on secure boot which provides a foundation for the security architecture of a
device. The paper attempts to introduce this concept and lists the processes involved, challenges
faced, and best practices recommended.
Introduction
Connected IoT devices can be found in every can originate from anywhere. Devices must
aspect of modern digital life, from autonomous be capable of adapting to an evolving threat
and connected vehicles to medical devices, landscape. With the exponential increase
smart meters, and smartwatches. in connected devices and the value of data
stored in them, security has to be multifaceted,
While exposing a device to the external world, “baked-in” from the lowest levels of system-on-
trust needs to be established in the system. chip (SoC) design through to the applications
Hence, security is fundamental to successful that run on them and in communications
adoption of connectivity. Connected devices between devices and services.
operate in an environment where attacks
The first step to ensure security at the device level is through secure boot in an IoT-embedded
system.
01
MTH | Whitepaper
The hardware is set up beforehand such that it only authenticates code generated using security
credentials you trust.
Secure boot is applicable for any single-use device, something that is not intended to be
a general-purpose computing.
02
MTH | Whitepaper
Reliability
in
y C ha
pl
p
Su
Sa
fety
Critical
Secure
Boot
Ke
yM
gmt
Physical
Attack
Remote
Attack
03
MTH | Whitepaper
04
MTH | Whitepaper
To summarize, the device start-up process is initiated by a trusted bootloader file and every phase is
run only after the previous phase is verified for authenticity and started successfully.
Secure boot is based on the hardware root of trust offered by OEMs.
Encryption Standard
Execution Environment
At minimum, it must
Protective hardware that
perform one or more proven
provides a trusted execution
cryptographic functions such
environment (TEE) for the
as implementation of Advanced
privilege software to run.
Encryption Standard (AES).
Key chip
components to
accomplish the
root of trust Easy Accessibility
Runtime Protection A flexible, yet simple user
A form of tamper protection interface that the host can
must be present and available interact with, through either
for the entire runtime. the host CPU and/or a host
controller toggling GPIOs.
The two major implementation steps in building the secure boot process and are outlined below.
• The keys are programmed into the one- • The starting point for a trusted
time programmable eFuse region of platform is the creation (by the
the chip. Care must be taken to ensure developer) of a bug-free and malware-
that the right key is programmed free code base.
as the same key will be used for the
• Once the developer “trusts” the
signing process. A single error in
code, the developer digitally signs the
key programming will make the chip
code so that accidental or deliberate
unusable for any future task.
modifications to the code base will be
detected during the secure boot cycle.
05
MTH | Whitepaper
06
MTH | Whitepaper
Conclusion
When properly configured, secure boot lays capabilities. Therefore, it is critical this be
the foundation for a root of trust and is a factored into the early-stage design phase.
requisite for system security. We believe Cyient offers a comprehensive range of
security is an integral part of IOT adoption services and solutions for securing embedded
and connected systems. Secure boot IOT devices across multiple industry verticals.
implementation requires specific hardware
07
MTH | Whitepaper
We partner with customers to operate as part Europe, Middle East, and Africa Headquarters
of their extended team in ways that best suit Cyient Europe Limited
their organization’s culture and requirements. Apex, Forbury Road,
Our industry focus includes aerospace and Reading
defense, healthcare, telecommunications, rail RG1 1AX
transportation, semiconductor, geospatial, UK
industrial, and energy. We are committed T: +44 118 3043720
to designing tomorrow together with our
stakeholders and being a culturally inclusive, Asia Pacific Headquarters
socially responsible, and environmentally Cyient Limited
sustainable organization. Level 1, 350 Collins Street
Melbourne, Victoria, 3000
For more information, please visit Australia
www.cyient.com T: +61 3 8605 4815
F: +61 3 8601 1180
Global Headquarters
Cyient Limited
Plot No. 11
Software Units Layout
Infocity, Madhapur
Hyderabad - 500081
India
T: +91 40 6764 1000
F: +91 40 2311 0352
Follow us on:
© 2022 Cyient. Cyient believes the information in this publication is accurate as of its publication date; such information is subject to change
without notice. Cyient acknowledges the proprietary rights of the trademarks and product names of other companies mentioned in this document.
08