About This Training
Designing Embedded Linux Systems with Strong Software Authentication:
Best Practices for Accelerating Software Development without Sacrificing Security
As smart connected systems are deployed widely, ensuring the security of these systems and the data they process is ever more critical. Checking authenticity of software running on these remote connected devices is paramount to ensuring their security.
To achieve this, an essential best practice is to establish secure boot and chain of trust in the software running on your embedded Linux systems.
This presentation explores the “Secure by Design” approach to software security for embedded systems using NXP i.MX processors.