Linux Security Development and Consulting Services

Security, Secure Boot and Chain-of-Trust Experts

Konsulko Group has extensive expertise in device security including building a chain of trust starting at boot-time, and encrypting, verifying and measuring the integrity of the system and core software at every stage. Integration of these technologies in Yocto Project, and key management are other important components of the solution.

Our engineers have commercial experience with the open source technologies necessary to help you effectively manage and support the security of your project. We have helped customers in many disparate industries from consumer to medical to industrial.

Chain-of-trust solutions

From power on
through applications
and software update

Secure boot

  • NXP i.MX6/7/8
  • NVIDIA Tegra K1/X1/X2/Xavier
  • R-Car3
  • TPM-based systems

Verified boot support

  • U-Boot

Verified root filesystem support

  • dm-verity

Encrypted filesystem support

Integrity support for encrypted volumes

  • dm-integrity

Hardware Security Manager

HSM-enabled kernel and
middleware key management

Linux Kernel Integrity Measurement Architecture

  • IMA
  • EVM

End-to-end conditional access systems

  • Software implementation of modern crypto algorithms running on a smart card and other embedded microcontrollers
  • Hardware engines on modern processors
  • Server side OS hardening and lockdown