About This Training
As smart connected systems are deployed widely, ensuring the security of these systems and
the data they process is ever more critical. Checking authenticity of software running on
these remote connected devices is paramount to ensuring their security.
To achieve this, an essential best practice is to establish secure boot and chain of trust
in the software running on your embedded Linux systems.
This presentation explores the “secure by design” approach to software security for
embedded systems using NXP i.MX processors.