Introduction

The modern embedded systems are increasingly susceptible to software attacks, which are malicious activities aimed at exploiting software vulnerabilities to gain unauthorized access, steal data, disrupt services, or inflict other forms of damage. Concurrently, protecting intellectual property remains critically important.

This document provides guidelines on safeguarding the PIC32CM LS00 MCU against software attacks using the PIC32CM LS00 Curiosity Nano+ Touch Evaluation Kit. By leveraging the Boot ROM’s Secure Hash Algorithm 2 (SHA-256) Authentication, the PIC32CM LS00 can identify unauthorized code fragments in the non-secure memory and replace them with an authentic copy of the same from the secure memory region.