Module 6
Demo Architecture: End-to-End Secure Boot Design
Close with a practical architecture blueprint plus pseudo-demo you can adapt to your own platform.
Read 3 minAvg understanding 8 min
Learning objectives
- Apply secure boot design to a realistic embedded Linux reference product
- Map trust anchors, key placement, and verification checkpoints
- Use a lightweight pseudo-demo to connect architecture and implementation
Reference architecture: secure boot for embedded Linux IoT device
Target profile:
- ARM SoC with immutable ROM and OTP/eFuses
- U-Boot as second-stage bootloader
- Signed kernel + DTB (+ optional initramfs) via FIT
dm-verityprotected rootfs (A/B update)- TPM for measured boot and attestation
Boot sequence and trust anchors
- ROM verifies FSBL using fused root key hash.
- FSBL verifies U-Boot and enforces anti-rollback counter.
- U-Boot verifies FIT signature (kernel, DTB, initramfs).
- U-Boot extends measurements to TPM PCRs.
- Kernel boots and mounts verity-protected rootfs.
- User-space agent reports measurements / attestation evidence.
Key placement
- Root of trust: OTP/eFuse hash
- Boot verification public keys: embedded in boot chain policy
- Release signing private keys: off-device signer service/HSM
- Device identity/sealed secrets: TPM NV / sealed blobs
Verification checkpoints
- Checkpoint A: ROM -> FSBL signature + version
- Checkpoint B: FSBL -> U-Boot signature + version
- Checkpoint C: U-Boot -> kernel/DTB/initramfs FIT signature
- Checkpoint D: Kernel -> rootfs integrity (
dm-verity) - Checkpoint E: Runtime -> attested measured state
Failure response behavior
- Signature fail at any checkpoint: halt + explicit code + optional fallback slot
- Rollback violation: refuse older image even if correctly signed
- Rootfs integrity fail: mount denied, fallback/recovery policy engaged
Manufacturing provisioning (optional flow)
- Program OTP root key hash
- Lock lifecycle to production profile
- Verify lock + key readback
- Install initial signed image set
- Run secure boot self-test and record proof
Lightweight pseudo-demo walk-through
- Build and sign FIT (
kernel + dtb). - Boot once successfully with valid signature.
- Modify DTB byte to simulate tamper.
- Reboot and observe U-Boot signature failure.
- Show fallback slot behavior or controlled halt.
Practical takeaway
A secure boot design is only complete when boot, provisioning, and update/recovery paths all enforce the same trust policy.
Misconception to correct
"Verified boot alone covers the whole product."
You still need provisioning controls, measured evidence, and robust update/recovery behavior.
Previous lesson
Failure Cases: What Breaks in Real Devices
Course completion
You reached the end of this template course path.