Firmware Over-the-Air Update Security Model: Threat Modeling a Real Device
STRIDE threat modeling applied to an OTA firmware update system surfaces threats that neither the bootloader team nor the cloud team considered in isolation.
STRIDE threat modeling applied to an OTA firmware update system surfaces threats that neither the bootloader team nor the cloud team considered in isolation.
Overview
This note is part of the field-notes archive generated for this site. The summary below is the published excerpt; you can expand the full write-up anytime in the CMS.
Related notes
Tags
- ota
- security
- threat-modeling
- firmware
- embedded
Manish Bookreader
Electronics enthusiast, Embedded Systems Expert, Linux/Networking programmer, and Software Engineer passionate about AI, electronics, books, and cooking.