What role does memory play in securing the MCU for IoT applications?
  • Secure boot allows designers and equipment manufactures to establish a hardware-based root of trust. For secure boot to occur, it is essential that a microcontroller starts executing firmware from an internal, immutable memory. This way the firmware images stored in the microcontroller are inherently trusted since the code cannot be modified.
  • In the case of the CEC1702, code is stored in the boot ROM and authenticated before execution. The CEC1702 firmware code is encrypted for additional security. The CEC1702 firmware may also be used to authenticate system code from a SPI Flash.
© 2018 Microchip Technology, Inc.
Notice: ARM and Cortex are the registered trademarks of ARM Limited in the EU and other countries.
Information contained on this site regarding device applications and the like is provided only for your convenience and may be superseded by updates. It is your responsibility to ensure that your application meets with your specifications. MICROCHIP MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WHETHER EXPRESS OR IMPLIED, WRITTEN OR ORAL, STATUTORY OR OTHERWISE, RELATED TO THE INFORMATION, INCLUDING BUT NOT LIMITED TO ITS CONDITION, QUALITY, PERFORMANCE, MERCHANTABILITY OR FITNESS FOR PURPOSE. Microchip disclaims all liability arising from this information and its use. Use of Microchip devices in life support and/or safety applications is entirely at the buyer's risk, and the buyer agrees to defend, indemnify and hold harmless Microchip from any and all damages, claims, suits, or expenses resulting from such use. No licenses are conveyed, implicitly or otherwise, under any Microchip intellectual property rights.