Slide 37
Slide 37 text
Conclusion
• Boot veri
f
ication is important to trust device.
• If boot was compromised then any additional security application or any piece of
software cannot be trusted.
• Cryptographic hashing & signing is used to ensure authenticity of executed code.
• After boot up, hardware backed key attestation data could be used in user space to
decide authenticity of boot up.
37