Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore comprehensive bootloader security strategies in this 38-minute conference talk that addresses critical vulnerabilities in embedded systems during early startup phases. Learn to identify security-critical functionality within bootloaders and discover practical hardening techniques that extend beyond traditional cryptographic boot chains and runtime security measures. Examine real-world threats targeting bootloader components and understand how to avoid common security pitfalls that leave systems exposed. Master techniques for reducing the Trusted Computing Base (TCB) and identify hardware or software misconfigurations that can silently compromise your security defenses. Follow along with practical demonstrations using barebox as a case study to understand complementary security approaches including fuzzing core logic, implementing runtime hardening measures, and securely managing unlock scenarios. Analyze how these defensive strategies could have prevented recently reported vulnerabilities in bootloader systems. Gain actionable knowledge for reducing security risks during system startup and improving the overall security posture of embedded systems through proper bootloader hardening practices.
Syllabus
Bootloaders Under Fire: Real-World Threats and Practical Defenses - Ahmad Fatoum, Pengutronix
Taught by
Linux Foundation