EasyManua.ls Logo

ST STM32C0 Series

ST STM32C0 Series
56 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of tables
Table 1. Applicable products ..................................................................1
Table 2. Glossary ..........................................................................2
Table 3. Assets to be protected ................................................................6
Table 4. Attacks types and costs ...............................................................8
Table 5. Memory types and associated protection .................................................. 18
Table 6. Scope of STM32 embedded memory protection features ....................................... 21
Table 7. Software isolation mechanism .......................................................... 21
Table 8. Basic feature differences of TrustZone-based secure software .................................... 26
Table 9. Security features for STM32C0, STM32F0/1/2/3/4, STM32G0/4 devices ............................. 27
Table 10. Security features for STM32L0/1/4/4+, STM32WB, STM32WL devices .............................. 28
Table 11. Security features for STM32L5, STM32U5, STM32H503/5, STM32H72x/73/74x/75, STM32H7Ax/7Bx, STM32F7
devices.......................................................................... 29
Table 12. RDP protections ................................................................... 31
Table 13. Attributes and access permission managed by MPU........................................... 37
Table 14. Process isolation ................................................................... 38
Table 15. Security use cases .................................................................. 42
Table 16. Document revision history ............................................................. 49
AN5156
List of tables
AN5156 - Rev 8
page 54/56

Table of Contents

Related product manuals