The approach which we just discussed above can also be used for firmware images and secure
boot. Such a signature makes sure that only an authorized machine or user marks a firmware
prior to execution. This makes it tougher for hackers to create rogue firmware and infect a
system—since there is no chance that they could sign the code which was created by them.
Secure boot is a functionality which leverages this electronic signature. It makes sure all
the code which is defined be run on a machine is signed appropriately. After the booting pro-
cess, the device’s initial bits run and can process the verification of the electronic signature. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.