The protection of software embedded into the IoT devices is key for both end-to-end security of the IoT chain and the protection of IoT developers’ Intellectual Property (IP).
In order to run only authorized software and avoid any risk of malicious software, developers do need to provide a mechanism to verify both authenticity and integrity of the MCU application software.
This is the first role of a secure bootloader to verify that the MCU will run a genuine software built by the authorized entity.
The second role of a secure bootloader in a secure life cycle context, is to enable a secure software update over-the-air.
In a secure software update process, the software is encrypted for the IoT device and is decrypted and programmed only on the right device, thanks to the secure bootloader.
A Software Encryption Cloud Service will encrypt the standard software for each device or for a group of device on demand.
Trusted Objects has developed secure boot solutions making sure that the software is trusted and not modified.
The Trusted Objects security experts will help you to define the appropriate secure boot implementation which depends on the MCU features and capabilities.