Skip to content
Inovasense

Secure Boot

Secure Boot — A hardware-rooted security mechanism that ensures only authenticated and cryptographically verified firmware runs on a device from power-on.

Secure Boot

Secure Boot is a security mechanism that ensures a device executes only authenticated, untampered firmware and software during its startup sequence. It establishes a cryptographic chain of trust — from the first instruction executed after power-on through the operating system — making it a foundational layer of embedded security.

How Secure Boot Works

The secure boot process creates a chain of verification where each stage authenticates the next:

  1. Immutable Boot ROM — A small, read-only bootloader burned into silicon during manufacturing. This is the hardware root of trust — it cannot be modified by any software.
  2. First-stage bootloader — The Boot ROM verifies the cryptographic signature (e.g., Ed25519, RSA-4096, or post-quantum ML-DSA) of the first-stage bootloader before executing it.
  3. Second-stage bootloader — Verified by the first stage. Loads and authenticates the kernel or RTOS.
  4. Application firmware — The final stage, verified before execution.

If any stage fails verification, the device halts or enters a safe recovery mode — preventing compromised firmware from running.

ComponentRoleIntegrity Mechanism
Boot ROMHardware root of trustMask ROM — physically immutable
Fuse bank (OTP)Stores root public key hashOne-time programmable, write-locked
BootloaderLoads & verifies next stageDigital signature verification
FirmwareApplication codeSigned image with version rollback protection

Why Secure Boot Is Critical

Without secure boot, a device is vulnerable to:

  • Firmware injection attacks — Malicious code replaces legitimate firmware.
  • Supply chain tampering — Modified software inserted during manufacturing or shipping.
  • Persistent rootkits — Malware that survives factory resets.
  • Rollback attacks — Reverting to older firmware with known vulnerabilities.

The EU Cyber Resilience Act (CRA) will require secure boot for all internet-connected products sold in the EU from 2027. Devices without it will be unable to receive CE marking.

Secure Boot vs. Measured Boot vs. Trusted Boot

FeatureSecure BootMeasured BootTrusted Boot
Action on failureHalts executionLogs measurements, continuesReports to remote server
VerificationPre-execution signature checkPost-execution hash measurementPre-execution + attestation
StandardARM PSA, UEFITPM-based (TCG)Combination
Use caseIoT devices, embedded systemsEnterprise servers, cloudNetwork appliances, critical infra

Implementation Approaches

ARM Platform Security Architecture (PSA)

The most widely adopted framework for IoT secure boot. Defines Secure Processing Environment (SPE) and Non-Secure Processing Environment (NSPE) using ARM TrustZone.

FPGA-Based Secure Boot

For FPGA designs, secure boot involves:

  • Encrypting the bitstream (AES-256-GCM)
  • Authenticating with ECDSA or RSA
  • Storing keys in on-chip battery-backed RAM (BBRAM) or eFUSE

Secure Elements

Hardware chips like STMicroelectronics STSAFE-A110, Infineon OPTIGA Trust M, or NXP EdgeLock SE050 provide CC EAL6+ certified environments for key storage and signature verification.

Related Terms