The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Open Source Summit Europe 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.
This schedule is automatically displayed in Central European Summer Time, CEST (UTC +2). To see the schedule in your preferred timezone, please select from the drop-down menu to the right.
IMPORTANT NOTE: Timing of sessions and room locations are subject to change.
Sign up or log in to add sessions to your schedule and sync them to your phone or calendar.
As regulations like the Cyber Resilience Act (CRA) drive the adoption of stronger security measures, features such as verified and secure boot are becoming increasingly common. Within this context, the bootloader plays a crucial role in establishing the chain of trust for embedded Linux systems. This talk will explore security vulnerabilities in popular bootloaders that can undermine the effectiveness of verified boot. Attendees will gain a deeper understanding of these risks and learn practical techniques to mitigate them, ultimately improving the security posture of embedded devices.