Secure OTA Update Pipeline (Zephyr + MCUboot + STM32)
End-to-end demo that fetches signed firmware from a hardened web server, stages it into a secondary slot, and hands off verification to MCUboot with rollback on failure.
I’m Bruno Esquivel, a firmware engineer focused on secure bootloaders, OTA updates, TLS, and resilient networking on resource-constrained hardware. I like turning system design and security ideas into working, testable firmware.
A few focused projects that combine secure boot, OTA, networking, and embedded constraints.
End-to-end demo that fetches signed firmware from a hardened web server, stages it into a secondary slot, and hands off verification to MCUboot with rollback on failure.
Brought up an nRF-based board with a W5500 Ethernet shield, implemented robust reconnect logic, and used it as a testbed for secure firmware download flows.
Designed a small Strongswan lab to experiment with key exchange, certificate-based auth, and failure scenarios relevant to devices establishing secure tunnels to a backend.
Implemented a token-bucket rate limiter in a custom bootloader to throttle update attempts and reduce brute-force behaviour, adapting patterns from large-scale systems to small MCUs.
Short, focused notes on topics I’ve implemented or debugged in real firmware.
Quick view of what I work with most often. For the full story, grab the PDF.
The best way to reach me for roles, chats, or collaboration.