To use our site, you agree to the use of cookies and data processing according to our privacy statement.
Close
Search

Publications

This paper reveals common weaknesses in Secure Boot implementations and proposes practical steps to enhance security of this critical element of an embedded system.

13/07/2017
Learn more