Module 2

Where Attacks Actually Happen in Shipping Devices

Learn a practical threat view of secure boot failures including downgrade, recovery bypass, and key handling mistakes.

Read 4 minAvg understanding 10 min

Learning objectives

  • Model realistic adversary paths across boot and update surfaces
  • Prioritize controls by exploitability and impact
  • Detect where trust chains silently stop too early

Threat map: where secure boot actually gets bypassed

Attackers usually avoid cracking crypto and instead target implementation gaps.

High-probability attack paths

Unsigned update path

  • Main firmware path is signed, but recovery updater or factory updater is unsigned.
  • Attacker flashes crafted image through hidden service command.

Bootloader downgrade

  • Valid old signed image is accepted.
  • Known vulnerability in old bootloader gets reintroduced.
  • Root cause: no monotonic anti-rollback policy.

Recovery image bypass

  • Recovery mode intended for service, not production hardening.
  • Verification skipped "for convenience."
  • Attacker triggers recovery pin or software flag and boots untrusted payload.

Debug interface abuse (UART/JTAG/SWD)

  • Boot logs leak security state or key IDs.
  • JTAG unlocked in production allows memory/register patching.
  • Root cause: manufacturing profile not locked per lifecycle state.

Key leakage

  • Signing key copied to build VM, laptop, or insecure CI secret store.
  • Attacker signs malicious images that look legitimate.

Trust chain stopping too early

  • Bootloader verifies kernel but not DTB/initramfs/rootfs.
  • Malicious DT overlay changes hardware permissions or disables security features.

Real-world control priorities

  • Lock debug in production lifecycle state.
  • Sign and verify every executable boot artifact.
  • Enforce anti-rollback at earliest possible stage.
  • Secure manufacturing and release key workflows.
  • Protect recovery/update channels with equal policy.

Practical takeaway

You are rarely broken by crypto; you are broken by policy asymmetry between normal boot, update, and recovery paths.

Misconception to correct

"Attackers need physical invasive lab attacks to break secure boot."
Often false. Many real exploits use accessible debug/update workflows left weak by design.