Researchers from the University of Bristol Cyber Security Group and the University of Bath are conducting a survey to understand how developers implement secure boot in IoT devices and how it fits into real-world development workflows.
Secure boot is a key mechanism for ensuring that connected devices only run trusted firmware, but implementing and managing it in practice can involve challenges around root of trust, key provisioning, developer tooling, and operational processes.
To better understand how developers approach these challenges, the research team has created a short survey covering topics such as:
- The role secure boot plays in IoT device security
- How root of trust and secure boot features are implemented
- Development tools and documentation used during implementation
- Operational aspects such as key storage and device provisioning
If you work on IoT devices, embedded systems, or device security, your insights would be very valuable to this research.
The survey only takes about 8–10 minutes to complete. Complete the survey now.
Your input will help researchers better understand current practices and identify opportunities to improve secure boot tooling and development processes for IoT systems.
On behalf of that team, we want to thank you for your participation,