Paper
27 March 2024 A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
Shaofeng Gao, Kun Wang, Xinze Chen, Yong Fu
Author Affiliations +
Proceedings Volume 13105, International Conference on Computer Graphics, Artificial Intelligence, and Data Processing (ICCAID 2023); 1310542 (2024) https://doi.org/10.1117/12.3026824
Event: 3rd International Conference on Computer Graphics, Artificial Intelligence, and Data Processing (ICCAID 2023), 2023, Qingdao, China
Abstract
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt file is sent by the upper-level software, which is encrypted using the SM4 algorithm. This encryption is based on a hardware-unique ID and a pre-stored upper-level software-unique ID, which act as encryption keys. During the upgrade, a secure downloader utilizes its hardware-unique ID and a pre-stored upper-level software-unique ID as decryption keys to decrypt the file. If the decryption key does not match the encryption key, the decrypted txt file will not be readable. Once decrypted, the firmware is downloaded to the target device using BSL (Bootstrap Loader) technology. Practical tests have shown that this method can achieve "one file, one key," effectively preventing unauthorized use of the upgraded firmware.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Shaofeng Gao, Kun Wang, Xinze Chen, and Yong Fu "A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm", Proc. SPIE 13105, International Conference on Computer Graphics, Artificial Intelligence, and Data Processing (ICCAID 2023), 1310542 (27 March 2024); https://doi.org/10.1117/12.3026824
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Microcontrollers

Computer hardware

Computer security

Information security

Internet of things

Back to Top