Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
44 lines (44 sloc) 1.77 KB
youtube_video_url amazon_s3_presentation_url amazon_s3_video_url categories description image session_attendee_num session_id session_room session_slot session_speakers session_track tag tags title
san19
A discussion on proposed adoption of UEFI secure boot and capsule update mechanisms in conjunction with u-boot FIT and ATF root-of trust on a high security Linux system.<br /> - What benefits does adding UEFI secure boot to the mix bring ?<br /> - What benefits does adding UEFI capsule update bring ?<br /> - EFI stub booting ?<br /> - Is grub required ?<br /> - Does the UEFI secure boot method bring additional security over straight u-boot FIT image signing<br /> - Does capsule update provide the right path to isolate user-space Linux from low-level device specific update logic ?
featured path
true
/assets/images/featured-images/san19/SAN19-105.png
48
SAN19-105
Sunset V (Session 1)
end_time start_time
2019-09-23 14:55:00
2019-09-23 14:30:00
speaker_bio speaker_company speaker_image speaker_location speaker_name speaker_position speaker_url speaker_username
Embedded developer, Linux, u-boot, zephyr, ATF, OP-TEE.<br>Linaro member services.
Linaro
/assets/images/speakers/san19/bryan-o-donoghue.jpg
bryan.odonoghue@nexus-software.ie
Bryan O'Donoghue
Software engineer
bryan.odonoghue1
IoT Fog/Gateway/Edge Computing
session
Security
Linux Kernel
Boot Architecture
IoT and Embedded
IoT Fog/Gateway/Edge Computing
Open Source Development
SAN19-105 - Integrating UEFI services with ATF and u-boot FIT on mbed Linux
You can’t perform that action at this time.