mcuboot a secure bootloader for microcontroller class
play

MCUboot: A Secure Bootloader For Microcontroller-class Devices - PowerPoint PPT Presentation

MCUboot: A Secure Bootloader For Microcontroller-class Devices Aditj Hilbert <aditj@runtjme.io> Szymon Janc <szymon.janc@codecoup.pl> September 25, 2017 IoT challenges Small, memory-constrained, low-cost Example hardware:


  1. MCUboot: A Secure Bootloader For Microcontroller-class Devices Aditj Hilbert <aditj@runtjme.io> Szymon Janc <szymon.janc@codecoup.pl> September 25, 2017

  2. IoT challenges • Small, memory-constrained, low-cost Example hardware: 100 MHz, 256 KB of fmash, 32 KB of RAM! • Security • • Millions of connected devices present large attack surface Devices deployed in unprotected areas • Scale and Variety • • Customers want long-term fmexibility in choice of HW and OS without vendor lock-in • Customers need consistent and easy management across the fmeet

  3. MCUboot: Features Goal: Provide the foundation for secure upgrade • Image Verifjcation • Digital signatures supported: RSA, ECDSA, (soon Ed25519) Two supported upgrade methods: • Image swap • • Overwrite • Modular design: • Portable across Operating Systems Currently supports Apache Mynewt, Zephyr OS, Riot OS • Simple porting layer provided by the OS • • Uses minimal OS features: fmash driver, single thread, crypto services Version 1.0 just released!

  4. Flash Layout Bootloader Slot 0 Slot 1 Scratch • Slot 0: Primary image, code always runs from here Slot 1: New image for upgrade • During upgrade, MCUboot swaps slots using scratch • • Image trailer indicates state of swap and upgrade • Image header contains image size and version information

  5. Boot Operation Inspect swap status region Inspect swap status region Resuming Resuming YES NO interrupted interrupted swap process? swap process? Inspect image Inspect image YES Complete swap Complete swap trailer – swap trailer – swap requested? requested? NO Image signature Image signature valid? valid? YES Erase invalid image Perform swap Perform swap Erase invalid image Write swap completjon in Write swap failure in Write swap completjon in Write swap failure in image trailer image trailer image trailer image trailer Boot into image in slot 0 Boot into image in slot 0

  6. Tools • Newt tool (in Go) from Apache Mynewt Build images • • Sign images • Load • Run and debug images • Imgtool.py from Linaro keygen: Generate private/public keypairs to use for signing • getpub: Extract a public key as C source to be included in bootloader • • sign: Add a signature to an image Simulator • • Bootloaders are tricky! • Compiles on a host machine along with the simulation • Tests various confjguration of images, upgrades and signatures • Tests recovery of untimely upgrade interrupts, simulating power loss Run by Travis on every pull request given to github •

  7. Roadmap • Support for multiple fmash devices • More effjcient crypto libraries, additional signature algorithms More error detection • Key invalidation and revocation • • Abstraction layer to leverage HW-based security (e.g. accelerator, secure OTP) Additional tools for testing and debugging • • Porting to additional OS • Testing with lots of HW!

  8. MCUboot: Project Details • Has evolved out of the Apache Mynewt bootloader https://github.com/runtimeco/mcuboot • Mailing list: dev-mcuboot@lists.runtime.co • • Slack: https://join.slack.com/t/mcuboot/shared_invite/ MjE2NDcwMTQ2MTYyLTE1MDA4MTIzNTAtYzgyZTU0NjFkMg • Version 1.0 just released!

  9. Origins of MCUboot: Apache Mynewt MCU agnostic: ARM Cortex-M*, • AVR, MIPS, RISC-V • Pre-emptive, multi-threaded, power optimized RTOS Management Application Management Application Open networking stacks • Networking Networking including BLE host & controller Confjg Confjg Stats Stats Console & Sensor Console & Sensor & & • Secure Bootloader and Image & Shell Upgrad API & Shell Upgrad API Logs Logs e Upgrade e Drivers Power Drivers Power Flash fjle systems, console, • OS HAL OS HAL sensor framework & more Secure Bootloader & FFS Secure Bootloader & FFS • Build & Package Management – Newt Tool https://mynewt.apache.org/ Open Management Interfaces • Any module can be decoupled and (e.g., OIC 1.1 / IoTivity) used by other Operating Systems!

  10. Thank You!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend