Fiveable

๐Ÿ’พEmbedded Systems Design Unit 18 Review

QR code for Embedded Systems Design practice questions

18.3 Secure boot and firmware updates

๐Ÿ’พEmbedded Systems Design
Unit 18 Review

18.3 Secure boot and firmware updates

Written by the Fiveable Content Team โ€ข Last updated September 2025
Written by the Fiveable Content Team โ€ข Last updated September 2025
๐Ÿ’พEmbedded Systems Design
Unit & Topic Study Guides

Secure boot and firmware updates are crucial for embedded system security. They ensure only trusted software runs on devices and protect against unauthorized modifications. These processes use hardware-based security, cryptographic verification, and secure update mechanisms to maintain system integrity.

Implementing secure boot and firmware updates involves components like TPMs, secure bootloaders, and code signing. These technologies work together to create a chain of trust, verify software authenticity, and enable safe remote updates, enhancing overall system reliability and security.

Secure Boot Components

Hardware-based Security

  • Trusted Platform Module (TPM) provides hardware-based security functions
    • Stores cryptographic keys, certificates, and measurements securely
    • Offers secure storage and cryptographic operations (key generation, encryption, decryption)
    • Enables secure boot, disk encryption, and platform attestation
  • Secure element is a tamper-resistant integrated circuit
    • Protects sensitive data and cryptographic operations
    • Commonly used in smart cards, mobile devices, and IoT applications
    • Provides a secure environment for executing code and storing keys

Secure Boot Process

  • Secure bootloader verifies the integrity and authenticity of the firmware
    • Checks digital signatures or cryptographic hashes of the firmware components
    • Prevents the execution of unauthorized or tampered firmware
    • Ensures only trusted software is loaded during the boot process
  • Chain of trust establishes a sequence of trust from the hardware root of trust to the operating system
    • Each component in the chain verifies the integrity of the next component before handing over control
    • Starts with the immutable hardware root of trust (TPM or secure element)
    • Extends to the bootloader, kernel, and other critical system components
  • Measured boot records the boot process and creates a log of measurements
    • Each component in the boot process is measured (hashed) and recorded in the TPM
    • Measurements can be used for attestation and integrity verification
    • Allows detection of unauthorized modifications to the boot process

Firmware Update Security

Secure Firmware Distribution

  • Code signing ensures the authenticity and integrity of firmware updates
    • Firmware updates are digitally signed by the manufacturer or a trusted authority
    • The device verifies the digital signature before installing the update
    • Prevents the installation of unauthorized or tampered firmware updates
  • Over-the-air (OTA) updates enable remote firmware updates
    • Firmware updates are delivered wirelessly to the device
    • Eliminates the need for physical access to the device for updates
    • Requires secure communication channels and authentication mechanisms

Firmware Update Protection

  • Rollback protection prevents the installation of older or vulnerable firmware versions
    • Devices maintain a minimum acceptable firmware version
    • Firmware updates with a version lower than the minimum are rejected
    • Protects against attacks that attempt to exploit known vulnerabilities in older firmware
  • Firmware updates should be verified and authenticated before installation
    • The device should check the integrity and authenticity of the firmware update package
    • Cryptographic mechanisms (digital signatures, hashes) are used for verification
    • Ensures only genuine and unmodified firmware updates are installed