Practical steps to evaluate and protect Secure Boot
Existing requirements for immunity of Secure Boot are high, yet Riscure’s security experts typically find serious vulnerabilities in the majority of implementations during the first stage of security evaluation. This paper reveals common weaknesses in Secure Boot implementations and proposes practical steps to enhance security of this critical element of an embedded system.