YoVDO

Firmware Management for MCUs: The Quark Bootloader Approach

Offered By: Linux Foundation via YouTube

Tags

Key Management Courses UART Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of firmware management for microcontroller units (MCUs) through this conference talk focusing on the Quark Bootloader approach. Delve into the design and implementation of the Intel Quark Microcontroller Bootloader (qm-bootloader), with particular emphasis on its DFU-based Firmware Management functionality over USB and UART. Learn about the adaptation of the DFU protocol and dfu-util for UART, providing a uniform firmware-upgrade experience. Discover the simple Firmware Management protocol built on top of DFU, extending its capabilities beyond basic firmware upgrades. Gain insights into potential security extensions and understand how these concepts can be applied to various platforms beyond Intel architectures. Examine the QFU Image Format, flash layout for application partitions, and the QFM Protocol through practical examples. Investigate the Secure Firmware Upgrade feature, including its QFU extension, upgrade flow, and consistency flag. Explore key management aspects such as provisioning, revocation, firmware keys, and first-time provisioning. Understand the importance of Persistent Bootloader Data (BL-Data), its duplication, verification flow, and partitions. Identify reusable software components and benefit from lessons learned in firmware management for MCUs.

Syllabus

Outline
The Quark Bootloader aka QM-Bootloader
Firmware Management (FM) module
FM Protocol Stack Overview
(USB) DFU: Quick Introduction
QFU Image Format Overview
Flash layout: Application partitions
QFM Protocol: Examples
Secure FW Upgrade Feature: Overview What is provided
Secure FW Upgrade QFU extension
Secure FW Upgrade Upgrade flow
Secure FW Upgrade. Consistency flag and upgrade
Key Management Provisioning update mechanism
Key Management Revocation and firmware keys
Key Management: Key-update OFM packets
Key Management: First-time provisioning
Persistent Bootloader Data BL-Data
BL-Data: Duplication
BL-Data: Verification flow
BL-Data: Partitions and targets
Reusable software components
Some lessons learnt


Taught by

Linux Foundation

Tags

Related Courses

Applied Cryptography
University of Colorado System via Coursera
Asymmetric Cryptography and Key Management
University of Colorado System via Coursera
AWS SimuLearn: Lambda Security
Amazon Web Services via AWS Skill Builder
AWS SimuLearn: Playing with Encryption
Amazon Web Services via AWS Skill Builder
AWS SimuLearn: Protecting Data at Rest
Amazon Web Services via AWS Skill Builder