Secure Updates for Memory Constrained XIP Systems
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore secure update strategies for memory-constrained XIP (eXecute In Place) systems in this 31-minute conference talk. Delve into the challenges and solutions for updating XIP Linux systems, which allow code execution directly from flash memory without RAM copying. Learn about the renewed interest in XIP Linux for IoT devices, its memory optimization benefits, and low-power capabilities. Discover various OTA (Over-The-Air) update approaches, including userspace, RAM disk, bootloader, and TrustZone methods. Gain insights into overcoming obstacles in implementing secure updates for XIP systems, with real-world examples provided to illustrate practical applications.
Syllabus
Intro
About me
About this presentation
FOSS OTA updaters
OTA updater requirements
OTA classification 2
Double-copy OTA
XIP: execute in place
XIP advantages
XIP obstacles
OTA and XIP: Same goals...
sharper underwater rocks
Userspace OTA
RAM disk (initrd) OTA
Bootloader OTA
Trustzone OTA (ARM)
Conclusions
Taught by
Linux Foundation
Tags
Related Courses
NanomanufacturingStanford University via Stanford OpenEdx Hacking the Game & Watch
stacksmashing via YouTube SPIFFS vs LITTLEFS for ESP32 & ESP8266
Ralph S Bacon via YouTube Using EEPROM on ATMega328P
Colin O'Flynn via YouTube The IoT Hacker's Toolkit
Security BSides San Francisco via YouTube