1. Sadeghi
A.-R.
Wachsmann
C.
& Waidner
M. (2015). "Security and Privacy Challenges in Industrial Internet of Things." 52nd ACM/EDAC/IEEE Design Automation Conference (DAC). In Section III.A
"Trusted Platform
" the paper emphasizes that a secure boot process is fundamental to establishing a trusted computing base on an IoT device by verifying the authenticity and integrity of firmware. DOI: 10.1145/2744769.2747942.
2. NXP Semiconductors. (2021). AN4581: HABv4 Secure Boot on i.MX 6/7 Series. In Section 2
"High Assurance Boot (HAB) Introduction
" p. 5
it is stated that "HAB allows customers to sign their boot images... On every boot
the i.MX processor authenticates the image signature. If the authentication fails
the boot is terminated." This directly describes the function of secure boot.
3. Stancill
B. (2021). Building a Secure Boot Chain for an IoT Device. Courseware
University of Colorado Boulder. In the "Secure Boot" section
the material explains that the process creates a "chain of trust" where each stage verifies the next
ensuring "that the device is running authentic software."