This document discusses using measured boot techniques to authenticate code on embedded devices. It describes how measured boot works by securely calculating a log of all boot components. While traditionally used on x86 platforms, these techniques can also be applied to embedded devices. The document outlines how to modify a bootloader to extend measurements to platform configuration registers and how to measure files within Linux using the Integrity Measurement Architecture (IMA) and Extended Verification Module (EVM). It also discusses how the measured state can be used for local attestation by sealing keys and for remote attestation by signing the measurements log. Finally, it provides recommendations for deploying these techniques on embedded devices using bootloader patches and build system layers.