Skip to main content
  • Products
  • Evaluate our Software
  • Downloads
  • Free Utilities
  • Purchase
  • Silicon Vendors
  • Support
  • About Us
  • Blog
  • Forum
  • Search
  • Jobs
  • Newsletter
  • Blog
  • Contact
  • Shop
  • emSecure

    emSecure-Boot - Authentication at ROM level

    Secure boot

    • Customer authentication
    • Firmware authentication, anti hacking

    Exposed API

    • Use of security functions from firmware
    • Hardware authentication, cloning protection

    Minimal hardware requirements

    • Any CPU or architecture
    • 8 kByte boot ROM
    • 4 kByte work RAM (only during boot, re-usable by firmware)
    • 16 bit one-time programmable (OTP) storage
    • Optional: Unique device identifier (UID)

    Low latency

    • Typ. 10 - 200 ms

    What is emSecure-Boot?

    emSecure-Boot is a software module to secure the firmware running on a system. It is implemented in the ROM of a microcontroller or SoC and executed on boot of the system, before jumping to a user application (firmware).

    emSecure-Boot enables authentication of the chip customer, the firmware memory, and the hardware unit. It provides counter measures against the firmware being hacked or modified by third parties, and against being cloned to counterfeit systems.

    Why should I use emSecure-Boot?

    Most embedded systems, which are based on a microcontroller, are an easy target for firmware hacking.

    Flash contents can usually be modified or replaced with simple tools. Firmware update capabilities might make this process even simpler and applicable at large scale.

    If a hack, or hacking mechanism for a system, becomes public, it is often abused to

    • enable add-ons of the system, which should only be available at a higher-tier product variant, financially harming the product developer.
    • circumvent other anti-hacking or anti-cloning mechanisms, which enable production of possibly cheap and bad counterfeits, harming the developers profits and reputation, and possibly customers, too.
    • modify execution to run outside of hardware specification, putting the system and its surroundings under the risk of physical damage.
    • extract confidential resources, such as encryption keys, from the system, enabling execution of potentially harmful code from unverified sources.
    • take over the system and its communication interfaces to gain access to networks, attack other products or computers, or spread viruses, creating threats of unpredictable scale.

    emSecure-Boot adds security to prevent this.

    As a silicon vendor or chip designer, you might want to enable your customers to create a secure system and implement these crucial features in your devices.

    • List of downloads
    • Update notification
    • Pricing
    • Support
    • Silicon vendor resources

    Headquarters

    SEGGER Microcontroller GmbH

    Ecolab-Allee 5
    40789 Monheim am Rhein, Germany
    info@segger.com
    Tel.: +49-2173-99312-0
    Fax: +49-2173-99312-28

    Locations

    USA: SEGGER Microcontroller Systems LLC

    Boston area
    101 Suffolk Lane
    Gardner, MA 01440, USA
    us-east@segger.com
    Tel.: +1-978-874-0299
    Fax: +1-978-874-0599

    Silicon Valley
    Milpitas, CA 95035, USA
    us-west@segger.com
    Tel.: +1-408-767-4068

    China: SEGGER Microcontroller China Co., Ltd.

    Room 218, Block A, Dahongqiaoguoji
    No. 133 Xiulian Road
    Minhang District, Shanghai 201199, China
    china@segger.com
    Tel.: +86-133-619-907-60

    ISO 9001 certified

    ISO 9001

    30+ years of experience

    First-class embedded software tools since 1992
    • Imprint
    • Disclaimer
    • Code of Conduct
    • Privacy Policy
    © 2025 SEGGER - All rights reserved.