Skip to main content

Section outline

  • Session 1: Overview of System Security 
    • Classification of Security Attacks
    • Chain of Trust & Root of Trust
    Session 2: Boot Chain Security 
    • Low-Level Boot Process
    • Booting from SD/MMC
    • Trusted Boot Chain
    Session 3: Hands-on Lab – Booting the Platform with Pre-built Images 
    Session 4: Discussion & Security Threat Analysis