SWRA780A September   2023  – February 2024 CC3300 , CC3301

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
    1. 1.1 Terminology and Abbreviations
  5. 2Internet of Things (IoT) Products and Security
    1. 2.1 Physical Access
    2. 2.2 Local Network Connectivity
  6. 3Main Features
    1. 3.1 Secured Boot
      1. 3.1.1 Secured Boot Container
      2. 3.1.2 Secured Boot Flow
    2. 3.2 Wi-Fi Network Security
    3. 3.3 Rollback Protection
    4. 3.4 JTAG Protection
    5. 3.5 Secured Host Interface
  7. 4Revision History

Secured Host Interface

Important: Host interface security is still under design and must be implemented in next phases. Nevertheless, host interface security is brought here for reference.

Secured host interface focuses on the traffic that is transferred from the host MCU/MPU subsystem to the CC33xx companion IC. A potential hacker can hijack the interface HW lines and use those lines to read confidential information like encryption keys, payload of data units and more. A hacker can also write to those lines and cause unwanted behavior of the device or give misleading events to the host controller as is illustrated in Figure 3-3.

GUID-20230606-SS0I-LZ5Q-TLX4-LBMMG1XGGPNC-low.pngFigure 3-3 Host Interface Threat