Overview
- Protection of the embedded secrets against professional hackers stealing actions
- Protection of Non-Volatile-Memory to make sure that pirates:
- Do not access the code (boot loader, test functions) which could be used to extract the embedded software or data
- Can not extract the embedded software which would allow them to:
- Gain information to be able to easily perform cheaper attacks
- Emulate the code on another device
- Have no access to user data
- Great efficiency: needs very little silicon area, consumes very low energy and does not degrade the IC performance
- 100% Hardware based: does not require extra-software design as it relies on the IC itself
Please sign in to view full IP description :
|