Secure Boot and Chain of Trust
Cybersecurity, YoctoEnsure your device is not running tampered software by verifying its authenticity before execution. Establish software authenticity all the way from the bootloader to user applications. Our secure boot services help implement:
Verified bootloader (NXP i.MX / QorIQ, Qualcomm Snapdragon, TI Sitara, Atmel SAMA5, Xilinx Zynq and more)
Kernel verification (FIT image, SoC specific mechanisms)
Root filesystem verification (dm-verity, IMA/EVM, FIT image)
Filesystem cryptography, Filesystem-level encryption (dm-crypt)