Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Slide 18 Slide 19 Product List
Cortex-M7-Slide12
It is becoming increasingly clear that embedded system insecurity affects everyone and every company. Products can be cloned, software copied, systems tampered with and spied on, and many other things that can lead to revenue loss, increased liability, and diminished brand equity. Microchip SAM S70/E70 series is embedded with a lot of hardware-based security. The Integrity Check Monitor (ICM) is a DMA controller that performs hash calculation, such as SHA, over multiple memory regions through the use of transfer descriptors located in memory. Low power debouncer inputs (WKUP0 and WKUP1) can be used for tamper detection. Additionally, if it is enabled, the anti-tampering will immediately clear the general purpose backup registers. It also includes up to 256-bit AES engine with DMA and TRAN. Finally, the external data bus of the SDRAM Controller can actually be scrambled to prevent IP data located in off-chip memories from being easily recovered by analyzing data at the package pin level of either microcontroller or memory device. The scrambling and unscrambling are performed on-the-fly without additional wait states.
PTM Published on: 2016-02-05