SWRA780A September   2023  – February 2024 CC3300 , CC3301

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
    1. 1.1 Terminology and Abbreviations
  5. 2Internet of Things (IoT) Products and Security
    1. 2.1 Physical Access
    2. 2.2 Local Network Connectivity
  6. 3Main Features
    1. 3.1 Secured Boot
      1. 3.1.1 Secured Boot Container
      2. 3.1.2 Secured Boot Flow
    2. 3.2 Wi-Fi Network Security
    3. 3.3 Rollback Protection
    4. 3.4 JTAG Protection
    5. 3.5 Secured Host Interface
  7. 4Revision History

Secured Boot

Secure boot main purpose is to validate the integrity and authenticity of the runtime binary during boot to verify that the downloaded RAM bootloader and firmware is signed by TI and has not been tampered with. Authorized firmware is firmware that came from the right entity, has the right attributes (for example, the right version), or is intended for the specific device. The secure boot is always the first code that runs on the device no matter what is the life cycle state. Implementing a secure boot process is critical to device integrity throughout the life cycle. A compromised boot process allows an attacker to inject malware, access assets or entirely replace the firmware running on the device. A secure boot process is essential to make other security features possible by providing the necessary degree of trust.