Skip to main content
  • Products
  • Software evaluation
  • Downloads
  • Free utilities
  • Purchase
  • Silicon Vendors
  • Support
  • About us
  • Blog
  • Forum
  • Search
  • Jobs
  • Newsletter
  • Blog
  • Contact
  • Shop
  • emBoot-Secure

    emBoot-Secure

    The solution for secure firmware updates

    Contact us
    Downloads
    Documentation
    1. 1.Overview
    2. 2.Key features
      1. 2.1.Secure firmware authenticity through digital signatures
      2. 2.2.Protected update packages with compression and encryption
      3. 2.3.Seamless integration into production workflows
    3. 3.Use cases
      1. 3.1.Secure firmware updates for consumer devices
      2. 3.2.Secure firmware updates in industrial environments
    4. 4.How emBoot-Secure works
      1. 4.1.Key generation
      2. 4.2.Signing and creating the update package (Firmware Packager)
      3. 4.3.Firmware transfer
      4. 4.4.Firmware update
    5. 5.Supported algorithms
    6. 6.Licensing
    7. 7.FAQ

    Overview

    emBoot-Secure is SEGGER’s Cyber Resilience Act-compliant solution for secure and verifiable firmware updates on embedded devices. This end-to-end approach protects embedded devices against unauthorized firmware modifications, intellectual property theft, and device cloning. It ensures that only authentic, manufacturer-approved firmware is installed, using a public-key cryptographic architecture that keeps the private signing key protected at all times.

    In the context of the EU Cyber Resilience Act (CRA), secure updateability is a core requirement for modern embedded systems. emBoot-Secure provides a robust foundation for meeting these regulatory demands by protecting devices throughout their entire lifecycle, from production to long-term operation in the field.


    Key features

    An icon featuring a document with lines and a signature, displayed alongside a padlock. The design symbolizes security and privacy in managing documents or contracts.

    Secure firmware authenticity through digital signatures

    All firmware updates are digitally signed using modern cryptographic algorithms. Devices verify the signature before installation, ensuring firmware integrity and reliably detecting any manipulation or unauthorized modification.

    A circular teal icon featuring a white padlock with a key inserted into it. The design symbolizes security and access, representing the concept of locking or unlocking information.

    Protected update packages with compression and encryption

    Firmware update packages are compressed to reduce transfer size and storage requirements. Encryption protects firmware contents during distribution, preventing inspection or reverse engineering while updates are delivered through customer-defined channels.

    A circular icon featuring a white gear, a flowchart element, and geometric shapes on a teal background. This design suggests themes of technology, process management, or workflow visualization.

    Seamless integration into production workflows

    emBoot-Secure integrates smoothly into existing build and release processes. The Signature Server is added as a dedicated hardware-based signing component that securely holds the private key and performs all signing operations, without disrupting established development or production workflows.


    Use cases

    Keyvisual use case for SEGGER emLoad

    Secure firmware updates for consumer devices

    emBoot-Secure uses cryptographically secure algorithms instead of simple checksums to detect manipulated firmware. The bootloader verifies firmware integrity before execution and will not start modified or unauthorized firmware. Optionally, a recovery firmware can be installed automatically if manipulation is detected, depending on the customer configuration.

    Firmware updates themselves are not fetched by the bootloader. Update delivery is handled by the application software. Once a valid update package is provided to the bootloader, it is securely installed during the next restart.

    A close-up view of a machine control panel featuring various buttons, knobs, and a digital display. The controls include emergency stop, program selection, spindle override, and feed rate settings, designed for operating a CNC machine or similar equipment.

    Secure firmware updates in industrial environments

    emBoot-Secure enables reliable firmware updates on devices with limited or no internet connectivity. This is particularly valuable in industrial systems with closed networks, long operating lifetimes, or strict security policies.

    Firmware updates can be distributed using customer-defined methods that require physical access, such as USB sticks or SD cards. emBoot-Secure ensures that only authenticated firmware is installed, supporting secure and controlled update processes while maintaining the reliability of industrial equipment.


    How emBoot-Secure works

    emBoot-Secure follows a complete, end-to-end workflow for secure firmware updates. The process includes cryptographic signing, compression, optional encryption, and reliable installation on the device, integrating smoothly into development, production, and field-update environments.

    Key generation

    A public–private key pair is created using either the SEGGER Signature Server or SEGGER KeyGen as part of the initial setup.

    A dark background filled with cascading vertical lines of binary code (0s and 1s) creates a digital, futuristic atmosphere. The pattern gives a sense of depth, resembling a virtual tunnel or data stream, enhancing themes of technology and information.

    SEGGER Signature Server (recommended)

    The private key is generated and stored securely on the Signature Server. It never leaves this controlled environment, ensuring maximum protection and simplifying compliance with modern security requirements.

    A dark background filled with cascading vertical lines of binary code (0s and 1s) creates a digital, futuristic atmosphere. The pattern gives a sense of depth, resembling a virtual tunnel or data stream, enhancing themes of technology and information.

    SEGGER KeyGen

    The key pair is generated on a local PC, giving full local control. The generated private key can later be imported into a SEGGER Signature Server to benefit from its advanced security features. A secure backup of the key can be stored in a safe, for example in a bank. 

    A flowchart illustrating the process of firmware packaging, featuring a SEGGER Signature Server. The Firmware Packager generates a hash and signature, which are validated against a private key. The server displays a green status indicator, confirming the verification process.

    Signing and creating the update package (Firmware Packager)

    The Firmware Packager prepares the firmware update package in a single, controlled step. It computes a cryptographic hash of the firmware and sends it to the SEGGER Signature Server. The server generates the digital signature using the securely stored private key and returns it to the Firmware Packager.

    The Firmware Packager then creates the final update package, optionally compressing and encrypting the firmware. The result is a compact and authenticated update file that is ready for distribution. Throughout the process, the private key remains protected on the Signature Server.

    The image illustrates a secure connection between a development site and an embedded device. It lists various transport methods, including WiFi, Bluetooth, Ethernet, USB, SD Card, and CAN, indicating that multiple communication options are available for data transfer.

    Firmware transfer

    The update package is delivered to the embedded device using any customer-supported transport channel, such as Wi-Fi, Bluetooth, Ethernet, USB, SD card, or CAN. The application on the device receives the update and stores it in non-volatile memory until it is processed by the bootloader during a restart.

    A flowchart illustrating the bootloader process. It includes steps for checking package and firmware signatures, decrypting, decompressing, and checking firmware version. Successful steps are indicated with green checks, while failures are marked with red crosses. The final step is to reset and start the process.
    Process of firmware update when update package is available

    Firmware update

    The emBoot-Secure bootloader manages the entire update process on the device. Its behavior depends on whether an update package is present.

    When an update package is available:

    When an update package is available, the emBoot-Secure bootloader decrypts and decompresses the content if required, checks the firmware signature and version, and installs the update. The update package may be retained so it can be reused if the installed firmware becomes corrupted. If the version is unchanged, the bootloader will not reinstall the firmware.

    When no update package is available:

    If no update package is present, the bootloader verifies the signature of the existing firmware and, if required, can restore a recovery image before starting the verified firmware.

    This mechanism ensures that devices always run authenticated firmware and remain secure and operational at all times.


    Supported algorithms

    SignatureRSA up to 8192 bits, ECDSA up to 521 bits (secp521r1)
    HashSHA 1/256/384/512
    EncryptionAES-128 .. 256
    CompressionSMASH-2, LZMA

    Licensing

    If you are interested in emBoot-Secure, please contact SEGGER to discuss your requirements. Our embedded experts will help define a solution that fits your application and security needs.

    Contact us


    FAQ

    Can the bootloader itself be updated?

    Yes, the bootloader can be updated in the same way as an application.

    Can the SEGGER Signature Server contain or generate an unlimited number of keys?

    The Signature Server can store and manage up to 100 keys.

    Is the Signature Server optional when using SEGGER KeyGen?

    Yes. The Signature Server is the recommended option. Alternatively, SEGGER KeyGen can be used without the Signature Server.

    Are other packages (e.g. emSecure RSA/ECDSA) part of the new emBoot-Secure?

    The required cryptographic algorithms (RSA and ECDSA) are included as part of emBoot-Secure. The full emSecure source code is not included.

    Which ECDSA curves are supported by emBoot-Secure?

    emBoot-Secure supports the following curves of the ECC Brainpool working group (RFC5639) and the National Institute of Standards and Technology (NIST):

    - brainpoolP256r1: 256 bits
    - brainpoolP320r1: 320 bits
    - brainpoolP384r1: 384 bits
    - brainpoolP512r1: 512 bits
    - NIST P-256 (secp256r1): 256 bits
    - NIST P-384 (secp384r1): 384 bits
    - NIST P-521 (secp521r1): 521 bits

    These curves cover the recommendations of various regulatory bodies, such as the German Federal Office for Information Security and NIST.

    Get in touch with us

    Have questions or need assistance? Our Embedded Experts are here to help!

    Reach out to us for:

    • Licensing quotes
    • Technical inquiries
    • Project support

     

    Contact us

    • Update notification
    • Support

    Headquarters

    SEGGER Microcontroller GmbH

    Ecolab-Allee 5
    40789 Monheim am Rhein, Germany
    info@segger.com
    Tel.: +49-2173-99312-0
    Fax: +49-2173-99312-28

    Locations

    USA: SEGGER Microcontroller Systems LLC

    Boston area
    101 Suffolk Lane
    Gardner, MA 01440, USA
    us-east@segger.com
    Tel.: +1-978-874-0299
    Fax: +1-978-874-0599

    Silicon Valley
    Milpitas, CA 95035, USA
    us-west@segger.com
    Tel.: +1-408-767-4068

    China: SEGGER Microcontroller China Co., Ltd.

    Room 218, Block A, Dahongqiaoguoji
    No. 133 Xiulian Road
    Minhang District, Shanghai 201199, China
    china@segger.com
    Tel.: +86-133-619-907-60

    ISO 9001 certified

    ISO 9001

    30+ years of experience

    First-class embedded software tools since 1992
    • Imprint
    • Disclaimer
    • Code of Conduct
    • Privacy Policy
    © 2026 SEGGER - All rights reserved.