Secure Boot

GET THE SECURITY & PERFORMANCE YOU NEED

Highly secured root of trust

 

  • Security Objectives
  • Ensure the executed code has not been tampered
  • Ensure the executed code comes from a trusted party
  • Ensure the firmware’s confidentiality
  • Ensure updates security
  • Addressed Threats
  • Firmware tampering
  • Invasive probing
  • Side-channel analysis
  • Fault injection analysis
  • Invasive hardware modifications (FIB)
  • Root of trust establishment is required
  • Initial trust in the hardware platform
  • Initial trust in the executed software

Key Features

  • Tunability for consumer requirements:
  • Security
  • Various options: public/private key authentication – SCA – FIA – PUF
  • Area
  • Performance
  • Ensure Secure Firmware Update
  • Security evaluation
  • Before delivery, internal security evaluation
  • Secure-IC’s Virtualyzr tool: Pre-Silicon Security Evaluation tool
  • Check that it is impossible to find all or part of the secret key

 

For more detailed information on Secure Boot, please get in touch below.

Contact