i.MX6 Linux High Assurance Boot (HAB) User's Guide
消耗积分:0 | 格式:pdf | 大小:262KB | 2015-12-27
赵俊波
分享资料个
Contemporary electronic gadgets often have opportunities to do system upgrade. The upgrade is so convenient that the end user can retrieve the updated image and do it themselves. But this also opens a back-door for malware writers. They may provide updated image which contains virus and rootkit. Once such system is upgraded and used, bad consequences can be expected, such as theft of critical personal information, anonymous monitor on personal activities, etc.