The protection of software embedded into the IoT devices is key for both end-to-end security of the IoT chain and the protection of IoT developers’ intellectual property (IP).
In order to run only authorized software and avoid any risk of malicious software, developers do need to provide a mechanism to verify both authenticity and integrity of the MCU application software.
Trusted Objects has developed secure boot solutions making sure that the software is trusted and not modified.
The Trusted Objects security experts will help you to define the appropriate secure boot implementation which depends on the MCU features and capabilities.
The Secure Element can be the root-of-trust validating the authenticity and the integrity of the IoT device software.