This video contains proprietary information and cannot be shared publicly at this time.
Figure 1
Figure 2
Computer Science and Engineering
Team 16
Team Members |
Faculty Advisor |
Agean Binan |
Jerry Shi, Bing Wang Sponsor UTC Pratt & Whitney |
sponsored by
The team researched possible avenues of attack and determined what types of attacks are most likely or most crippling to the provided development board. Based on the vulnerability analysis, the team identified viable mitigation strategies for the most relevant attacks. The team designed a secure boot process that makes sure the development board boots into the correct program. The process verifies the boot image with various encryption and authentication methods, and detects attacks with built-in hardware mechanisms. The team has created and tested a prototype secure boot image. The team also evaluated the performance of crypto operations, with and without hardware acceleration, in terms of the execution time, and memory footprint.