SWRA780A September   2023  – February 2024 CC3300 , CC3301

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
    1. 1.1 Terminology and Abbreviations
  5. 2Internet of Things (IoT) Products and Security
    1. 2.1 Physical Access
    2. 2.2 Local Network Connectivity
  6. 3Main Features
    1. 3.1 Secured Boot
      1. 3.1.1 Secured Boot Container
      2. 3.1.2 Secured Boot Flow
    2. 3.2 Wi-Fi Network Security
    3. 3.3 Rollback Protection
    4. 3.4 JTAG Protection
    5. 3.5 Secured Host Interface
  7. 4Revision History

Physical Access

In the case of a physical access attack, the exposure is at the product level and there are a couple factors to consider. Physical access can result in attack vectors such as product-level manipulation and printed circuit board (PCB) manipulation. The product-level manipulation vector refers to attacks in which the attacker can control the way the device operates by using the external interfaces that the final product offers (such as power line, buttons, and so forth). The second vector relates to the ability of the attacker to access the actual board (PCB) and to monitor the lines or the hardware interfaces. In more serious cases, an attacker can even attempt to manipulate the wires, replace devices on the PCB, connect to the main controller, and inject signals to trigger certain actions.