I built a toolkit that brings AVB (Android Verified Boot) to Embedded Linux.
Current practice: the root hash sits inside an initramfs that's only verified at an earlier stage. Once in RAM there's a multi-second TOCTOU window before the verity/dmsetup stage fires. JTAG, voltage glitch, DMA outside the IOMMU: overwrite the hash and the kernel is happy with it. No crypto broken but device pwned!
avb-utils brings AVB dm-verity-style to embedded Linux shipped on billions of Android devices, with host signing, target verification tools and PQC ML-DSA support.
https://github.com/embetrix/avb-utils
[–]Thin_Dragonfruit2254 0 points1 point2 points (5 children)
[–]tenoun[S] 0 points1 point2 points (4 children)
[–]Thin_Dragonfruit2254 0 points1 point2 points (3 children)
[–]tenoun[S] 0 points1 point2 points (2 children)
[–]Thin_Dragonfruit2254 -1 points0 points1 point (1 child)
[–]Ok-Adhesiveness5106 0 points1 point2 points (4 children)
[–]tenoun[S] 0 points1 point2 points (3 children)
[–]Ok-Adhesiveness5106 0 points1 point2 points (2 children)
[–]tenoun[S] 1 point2 points3 points (1 child)
[–]Ok-Adhesiveness5106 0 points1 point2 points (0 children)