Trusted Platform Module

1 articles

Improving Embedded Operating System Security Part 5: Securing Code and Data

By Bill Graham Secure the Boot and Execution Embedded systems are vulnerable at boot time. For example, it’s common for hobbyists to re-flash consumer products’ firmware to change the way it operates. However, malicious attacks on device boot up and operation are undesirable for mission critical systems. In addition, devices often allow updates via web interfaces or other remote access…