JamaicaCAR Security Features
David Beberman
ESE Kongress 2016 (Updated 2017-08-30)


Many security experts in the computing device and equipment industry think of security as starting and ending with secure boot. The thought is that as long as the software that is loaded when the CPU is powered on is signature verified, then everything is secure. For isolated systems this may be sufficient: these usually contain a single image burned into a FLASH as firmware, which is verified by a non-modifiable FSBL (first-stage boot loader).

However moving beyond those island settings to multiple connected systems, running multiple ap­plications that assume frequent updates, security issues become much more than a mere secure boot.


Download: PDF icon PDF (English), PDF icon PDF (German)