1. Boot chain review
-
Analysis of your bootloader, firmware, MCU and FPGA architecture
-
Identification of attack surfaces
-
Review of key storage, debug interfaces and boot verification mechanisms
-
Assessment of secure boot readiness on your target platform

