Skip to main content

Implementing Secure Software Upgrades in Embedded Systems: Best Practices and TPM Integration

WEBINAR RECORDING ON-DEMAND

Presenter:

Dawson Theroux - Embedded Software Designer, Fidus

Duration: 30 minutes

Missed the live webinar? No worries! You can now access the on-demand version of our insightful webinar.

Creatives for Webinar Landing Page (6)

Watch Part 2 of our secure boot webinar series as Dawson Theroux continues his exploration of embedded system security. In this on-demand session, we dive into the implementation of secure software upgrades—a crucial measure to protect against vulnerabilities while ensuring device integrity and performance.

Why watch the webinar?

  • Securing the Software Upgrade Process: Learn key mechanisms to protect systems during an upgrade, including hashing, encryption, and TPM-based secret management.
  • Building a Resilient Upgrade System: Discover how to prevent unauthorized downgrades and protect against reintroducing known vulnerabilities.
  • Integrating TPM in Embedded Systems: Understand how TPM can seal secrets and manage encryption keys, only releasing them when the system is in a trusted state.
  • Ensuring System Recovery: Explore recovery strategies, including A/B partition mechanisms and minimal firmware recovery images, to maintain functionality after a failed upgrade.

This in-depth session includes real-world examples, practical tips, and proven methodologies to secure your embedded systems while ensuring they can recover effectively from failures. Whether you’re working with TPM, secure boot, or advanced encryption techniques, this webinar will equip you with the tools to enhance the security and resilience of your embedded software.

Watch the Webinar Recording