Contents
1 General information ...............................................................2
2 Overview ..........................................................................5
2.1 Security purpose ...............................................................5
3 Attack types .......................................................................7
3.1 Introduction to attack types ......................................................7
3.2 Software attacks ...............................................................8
3.3 Hardware attacks ..............................................................9
3.3.1 Non-invasive attacks .....................................................10
3.3.2 Silicon invasive attacks ...................................................11
3.4 IoT system attack examples ....................................................12
3.5 List of attack targets ...........................................................13
4 Device protections................................................................16
4.1 Configuration protection ........................................................16
4.2 TrustZone
®
for Armv8-M architecture.............................................16
4.3 Dual-core architecture .........................................................17
4.4 Memory protections ...........................................................18
4.4.1 System flash memory ....................................................19
4.4.2 User flash memory ......................................................19
4.4.3 Embedded SRAM .......................................................19
4.4.4 External flash memories ..................................................20
4.4.5 STM32 memory protections ...............................................21
4.5 Software isolation .............................................................21
4.6 Debug port and other interface protection .........................................21
4.7 Boot protection ...............................................................22
4.8 System monitoring ............................................................22
5 Secure applications...............................................................23
5.1 Secure firmware install (SFI) ....................................................23
5.2 Root and chain of trust .........................................................23
5.3 STMicroelectronics proprietary SBSFU solution ....................................23
5.3.1 Secure boot (SB) .......................................................23
5.3.2 Secure firmware update (SFU) .............................................24
5.3.3 Configurations .........................................................25
5.4 Arm TF-M solution.............................................................25
5.5 Product certifications ..........................................................26
AN5156
Contents
AN5156 - Rev 8
page 52/56