We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback
00:00

Formal Metadata

Title
WolfBoot
Subtitle
Secure boot and remote updates
Title of Series
Number of Parts
490
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Firmware updates in IoT pose a new set of security risks. Secure bootloaders can be handy to deploy new versions of the firmware on those devices that are only reachable through a remote connection. wolfBoot is a portable, GPL, OS-agnostic, secure bootloader solution for 32-bit microcontrollers, relying on wolfCrypt for firmware authentication, providing secure firmware update mechanisms. Due to the minimalist design of the bootloader and the tiny HAL API, wolfBoot is completely independent from any OS or bare-metal application, and can be easily ported and integrated in existing embedded software projects to provide a secure firmware update mechanism. This presentation will focus on the implementation details and the design choices of the project, and the porting done to ARM Cortex-M and RISCV32 microcontrollers.
BootingComputer virusProjective planeSoftwareFreewareComputer animation
System programmingComputer architectureEmbedded systemInformation securityBootingComputer animation
System programmingComputer architectureEmbedded systemTransport Layer SecurityLibrary (computing)Information securityBootingBitLibrary (computing)MicrocontrollerProduct (business)Business modelCodeCore dumpCryptographyComputer programRepository (publishing)Exception handlingDefault (computer science)Server (computing)Physical systemInternet der DingeComputer animation
System programmingPoint cloudGateway (telecommunications)Polygon meshTransport Layer SecurityComponent-based software engineeringCryptographyPhysical systemLevel (video gaming)CryptographyStandard deviationComputer hardwareInternet der DingePoint (geometry)Perfect groupComputer animation
Constraint (mathematics)Power (physics)Resource allocationConnectivity (graph theory)CodeBefehlsprozessorInformation securityPhysical systemAuthenticationLibrary (computing)Transport Layer SecuritySurfaceMechanism designCryptographyDatabaseVulnerability (computing)Point (geometry)FirmwareComputer-generated imageryHeat transferInjektivitätPoint cloudInformation securityPhysical systemBefehlsprozessorTelecommunicationCryptographySoftwareEndliche ModelltheorieAuthenticationVulnerability (computing)Power (physics)CodeMultiplication signSurfaceBitInternetworkingComponent-based software engineeringMereologyVirtual machineMiniDiscLibrary (computing)Primitive (album)MicrocontrollerDataflowCASE <Informatik>Communications protocolPredictabilityNon-volatile memoryOcean currentServer (computing)Context awarenessModule (mathematics)Device driverInternet service providerCore dumpComputer animation
Vulnerability (computing)Point (geometry)Computer-generated imageryFirmwareHeat transferInjektivitätBootingElectronic signatureMechanism designPhysical systemInformationMicrocontrollerData integrityPower (physics)Constraint (mathematics)AerodynamicsResource allocationError messageFirmwareElectronic signatureOrder (biology)32-bitDevice driverVulnerability (computing)ChainCodeCartesian coordinate systemFunctional (mathematics)Heat transferFlash memoryEncryptionRevision controlMultiplication signBootingField (computer science)Physical systemGroup actionDegree (graph theory)Phase transitionBranch (computer science)BitStack (abstract data type)Position operatorType theoryEntire functionNational Institute of Standards and TechnologyEllipseBootingSemiconductor memoryComputer animation
BootingMicrocontrollerData integrityConstraint (mathematics)AerodynamicsResource allocationBootingArchitectureAlgorithmArmReduced instruction set computingElectronic program guideRSA (algorithm)KinematicsKey (cryptography)Sign (mathematics)Electronic signatureComputer-generated imageryFirmwareServer (computing)Portable communications deviceIntegrated development environmentAuthenticationPublic-key cryptographyPoint cloudElectronic signatureKey (cryptography)WhiteboardBootingOperator (mathematics)INTEGRALArithmetic meanComputer hardwareSemiconductor memoryPoint (geometry)Goodness of fitOpen sourceCASE <Informatik>AlgorithmFlash memoryFormal verificationBootingRevision controlMereologyArmFirmwareSign (mathematics)Server (computing)BitElectronic mailing listPhysical systemNumberOrder (biology)Process (computing)Branch (computer science)MicrocontrollerPower (physics)Content (media)Partition (number theory)AbstractionFunctional (mathematics)Complete metric spaceSpacetimeComputer animation
Read-only memoryNon-volatile memoryPartition (number theory)Configuration spaceDuality (mathematics)Computer hardwareMicrocontrollerBootingRevision controlComputing platformReduced instruction set computingComputer architecture32-bitDevice driverDisintegrationSeries (mathematics)Operations researchRepository (publishing)Real-time operating systemSystem programmingMechanism designHeat transferLatent heatWhiteboardCartesian coordinate systemCASE <Informatik>Different (Kate Ryan album)BootingFlash memorySemiconductor memoryMappingFirmwareBootingPartition (number theory)Windows RegistryCombinational logicComputer hardwareMedical imagingTelecommunicationEndliche ModelltheorieBitNormal (geometry)CalculationRepository (publishing)Computing platformOperating systemKinematicsOperator (mathematics)PeripheralComputer animation
Computer-generated imageryBootingAddress spaceCodePartition (number theory)Linker (computing)Scripting languageSheaf (mathematics)Flash memoryLengthEmailBootingOperating systemPlastikkartePoint (geometry)SpacetimeLinker (computing)Real-time operating systemScripting languageCartesian coordinate systemComputer configurationComputer animation
BootingPartition (number theory)Factory (trading post)Server (computing)FirmwarePartition (number theory)Type theoryBootingFactory (trading post)Cartesian coordinate systemMedical imagingMultiplication signNilpotente GruppeBootingPublic-key cryptographyCASE <Informatik>Computer animation
FirmwareData integrityComputer-generated imageryElectronic signatureFormal verificationPartition (number theory)BootingPhysical systemRollback (data management)FirmwareBootingMedical imagingBootingInitial value problemComputer animation
BenchmarkImplementationBootingAlgorithm2 (number)SoftwarePublic-key cryptographyINTEGRALElliptic curveDiagram
SoftwareSoftware developerFormal languageBuildingPoint (geometry)Formal languageLevel (video gaming)Near-ringSoftware developerPosition operatorRemote procedure callEmailAddress spaceInformation securityComputer animation
Open sourcePoint cloud
Transcript: English(auto-generated)