Bootloader and code protect
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2013-02-02 1:43 AM
Posted on February 02, 2013 at 10:43
Hello ;
It was not clear to me in the documents ; we are loading the program through usart3(stm32f407) ; so can we still have the code protect fuse? I mean we dont our code to be copied; when using Jtag it is ok and protected ;but bootloader? Regards
This discussion is locked. Please start a new topic to ask your question.
2 REPLIES 2
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2013-02-02 1:57 AM
Posted on February 02, 2013 at 10:57
The system boot loaders have historically examined the readout protection bit, and disabled a significant subset of the functionality.
Part of your due diligence would be to enable ROP and confirm this, remember you personally need to understand the chip better than those who you consider adversaries. Code running within the part can access the entire address space.
Tips, Buy me a coffee, or three.. PayPal Venmo
Up vote any posts that you find helpful, it shows what's working..
Up vote any posts that you find helpful, it shows what's working..
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2013-02-03 1:18 PM
Posted on February 03, 2013 at 22:18 Thank you Clive .
