Conferences and supporting programme
Secure Boot, Chain of Trust and Data Protection
Secure boot is designed to protect a system against malicious code by ensuring only authenticated software runs on the device. Extending the authentication scheme from the bootloader to user space involves establishing a chain of trust. A detailed overview of existing open source solutions that can be leveraged to establish a chain of trust will be covered in this session. In addition to software authentication, protecting user data and intellectual property can be critical in certain applications, which can be achieved by means of encryption. While readily available mechanisms in the Linux kernel such as dm-crypt/LUKS can be used for encrypting partitions, the key used to encrypt the partition needs to be protected. Learn about the various hardware assisted options for secure key storage and takeaway the best practices based on lessons learnt from securing products on various platforms.
--- Date: 27.02.2019 Time: 14:30 - 15:00 Location: Conference Counter NCC Ost