Getting started with STM32U0 security

Revision as of 15:17, 17 January 2024 by Registered User


A practical guide to tools related to the STM32U0 security solutions. Examples are based on the boards, tools and code examples provided by ST. In the guides listed below, each step to be followed is described in detail.
It is advised to get familiar with the available tools by using these examples before making your own steps with the STM32Cube_U0.

Product Series STM32U03x STM32U08x
Board NUCLEO-U031R8 NUCLEO-U083RC
OEMiRoT memory size limits practical use Link to How To
OEMiSB no dedicated example, but applicable Link to How To

1. Introduction

The STM32U0 small memory footprint is not suited for extensive multi-tenant secure environment with isolation. Instead, the focus is on the secure boot and simple, but hardened protection of assets. The platform security certification is ambitious for such a small product, targeting SESIP3.

2. RDP regression

Important feature of the STM32U0 is the ability to lock out regression from RDP1 to RDP0 and allow password protected regression from RDP2 to RDP1.
Further reading:

3. Secure Boot

The secure boot example is a compact code showcasing the utilization of the boot lock feature and subsequent protections. The example is based on the STM32CubeMx.
The goal of the Secure Boot is to protect the application code and prevent execution of any other code on the device.

4. OEMiRoT

The customized Immutable Root of Trust (OEMiRoT) is more complex than the secure boot, as it features a protected loader capable of securely updating the application code.
It is advised to first try the general OEMiRoT wiki article to understand the term Root of Trust.

No categories assignedEdit