Skip to main content
  • Products
  • Evaluate our Software
  • Downloads
  • Free Utilities
  • Purchase
  • Silicon Vendors
  • Support
  • About Us
  • Blog
  • Forum
  • Search
  • Jobs
  • Newsletter
  • Blog
  • Contact
  • Shop
  • emSecure
  • Security Consideration

    Security consideration

    Contact us
    Downloads
    Documentation
    SEGGER emSecure
    1. 1.Anti-Hacking — Authentication of Firmware
      1. 1.1.Firmware Signing in Production
      2. 1.2.Anti-Hacking Bootloader Verification
    2. 2.Anti-Cloning — Authentication of Hardware
      1. 2.1.Hardware Signing in Production
      2. 2.2.Anti-Cloning Firmware Verification

    Security Consideration

    If you want to check the integrity of your data, for instance the firmware running on your product, you would normally include a checksum or hash value into it, generated by a CRC or SHA function. Hashes are excellent at ensuring a critical data transmission, such as a firmware download, has worked flawlessly and to verify that an image, stored in memory, has not changed. However they do not add much security, as an attacker can easily compute the hash value of modified data or images. Digital signatures can do more. In addition to the integrity check, which is provided by hash functions, a digital signature assures the authenticity of the provider of the signed data, as only he can create a valid signature. emSecure comes in different versions with different digital signature algorithms to fit any requirements of size or speed.

    emSecure can be used for two security approaches:

    1. Anti-hacking: Prevent tampering or exchange of data, for example the firmware running on a product, with non-authorized data.
    2. Anti-cloning: Prevent a firmware to be run on a cloned hardware device.

    Anti-Hacking — Authentication of Firmware

    Firmware Signing in Production

    To make sure only authorized firmware images are run on a product the firmware image will be signed with emSecure. To do this an emSecure key pair is generated one time. The private key will be included in the production process of the firmware. Once a firmware is created and ready to be shipped or included into a product it will be signed with this private key. The signature will be transferred and stored in the product alongside the firmware.

    emSecure_Firmware_Sign

    Anti-Hacking Bootloader Verification

    The public key will be included in the bootloader of the product, which manages firmware updates and starts the firmware.

    On a firmware update and when starting the product, the bootloader will verify the firmware by its signature. If they match, the firmware is started, otherwise the application will stay in the bootloader or even erase the firmware.

    The image illustrates a security system called "emSecure." It shows a central locked symbol connected to a public key, signed firmware, and two types of firmware: genuine (green checkmark) and counterfeit (red cross). The diagram emphasizes the verification process for ensuring firmware authenticity.

    Anti-Cloning — Authentication of Hardware

    Hardware Signing in Production

    To make sure a product cannot be re-produced by non-authorized manufacturers, by simply copying the hardware, emSecure will be used to sign each genuine product unit. First an emSecure key pair is generated one time. This is likely done at the production site.

    emSecure Device Sign

    Anti-Cloning Firmware Verification

    The private key will be included in the production process of the product. At the end of the production process, after the unit is assembled and tested, some hardware-specific, fixed, and unique data, like the unique id of the microcontroller is read from the unit. This data is signed by emSecure with the private key and the signature is written back to the unit into an OTP area or a specified location on memory. The public key will be included in the firmware which will run on the product. When the firmware is running it will read the unique data from the unit and verify it with the signature. When the signature does not match, for example, when it was simply copied to a counterfeit unit with other unique data, the firmware will refuse to run.

    emSecure_Device_Verification
    • List of downloads
    • Update notification
    • Pricing
    • Support
    • Silicon vendor resources

    Headquarters

    SEGGER Microcontroller GmbH

    Ecolab-Allee 5
    40789 Monheim am Rhein, Germany
    info@segger.com
    Tel.: +49-2173-99312-0
    Fax: +49-2173-99312-28

    Locations

    USA: SEGGER Microcontroller Systems LLC

    Boston area
    101 Suffolk Lane
    Gardner, MA 01440, USA
    us-east@segger.com
    Tel.: +1-978-874-0299
    Fax: +1-978-874-0599

    Silicon Valley
    Milpitas, CA 95035, USA
    us-west@segger.com
    Tel.: +1-408-767-4068

    China: SEGGER Microcontroller China Co., Ltd.

    Room 218, Block A, Dahongqiaoguoji
    No. 133 Xiulian Road
    Minhang District, Shanghai 201199, China
    china@segger.com
    Tel.: +86-133-619-907-60

    ISO 9001 certified

    ISO 9001

    30+ years of experience

    First-class embedded software tools since 1992
    • Imprint
    • Disclaimer
    • Code of Conduct
    • Privacy Policy
    © 2025 SEGGER - All rights reserved.