PowerBI Data Analyst - Create visualizations and dashboards from scratch
AI Adoption - Drive Business Value and Organizational Impact
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive 55-minute conference talk on Verified Boot, covering the process from ROM to userspace. Delve into the cryptographic prevention of system tampering on ARM processors, specifically focusing on Freescale's i.MX6. Learn about the open-source building blocks available for implementing a secure boot process, including the bootloader, kernel, and root file system signing. Discover the possibilities and limitations of this approach, and gain valuable insights from lessons learned during a large-scale project implementation. Understand the components involved in creating a tamper-resistant system where every byte can be cryptographically verified. Benefit from the expertise of Marc Kleine-Budde, a Linux kernel maintainer and embedded systems specialist from Pengutronix e.K., as he shares his knowledge on secure boot processes and obstacle avoidance during development.
Syllabus
Verified Boot: From ROM to Userspace
Taught by
Linux Foundation