<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Is it possible to extract firmware from nrf51822 even with MPU enabled?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/10056/is-it-possible-to-extract-firmware-from-nrf51822-even-with-mpu-enabled</link><description>Hi, I&amp;#39;m recently concerned with the latent risk that nrf51822 might be hacked by extracting the firmware also known as &amp;quot;snarf&amp;quot;ing.
And I know there is Memory Proection Unit(MPU) to prevent code region be readback by SWD. But I still can not estimate</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 04 Nov 2015 04:01:03 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/10056/is-it-possible-to-extract-firmware-from-nrf51822-even-with-mpu-enabled" /><item><title>RE: Is it possible to extract firmware from nrf51822 even with MPU enabled?</title><link>https://devzone.nordicsemi.com/thread/37272?ContentTypeID=1</link><pubDate>Wed, 04 Nov 2015 04:01:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:64813472-9350-4f78-b8dc-f7dff2f31e91</guid><dc:creator>joc</dc:creator><description>&lt;p&gt;Hey, John, thanks for your answer.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Is it possible to extract firmware from nrf51822 even with MPU enabled?</title><link>https://devzone.nordicsemi.com/thread/37271?ContentTypeID=1</link><pubDate>Tue, 03 Nov 2015 17:48:29 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2a27c20c-0c5f-4c60-aec1-ba186198c4c4</guid><dc:creator>JohnBrown</dc:creator><description>&lt;p&gt;Pretty much all chips can be hacked if you throw enough money at the task. Some will only set you back a few hundred dollars. What you have to ask yourself is this: is your app so clever and complicated that somebody else couldn&amp;#39;t easily duplicate the end result without even having to resort to reverse engineering. Most of the time, in my experience, the answer is no. Make it as secure as you can using the protection available would be my advice. If you think somebody is likely to blindly copy your firmware, you might put some odd &amp;quot;easter egg&amp;quot; type thing into the code, so that you could demonstrate the plagiarism.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>