<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>What precautions can be taken to avoid getting compromised due to the proprietary radio stack?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/41360/what-precautions-can-be-taken-to-avoid-getting-compromised-due-to-the-proprietary-radio-stack</link><description>In the light of recent news like this one, https://arstechnica.com/information-technology/2018/11/bluetooth-bugs-bite-millions-of-wi-fi-aps-from-cisco-meraki-and-aruba/ , I was wondering what precautions could I take to avoid any vulnerabilities in the</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 11 Dec 2018 13:28:08 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/41360/what-precautions-can-be-taken-to-avoid-getting-compromised-due-to-the-proprietary-radio-stack" /><item><title>RE: What precautions can be taken to avoid getting compromised due to the proprietary radio stack?</title><link>https://devzone.nordicsemi.com/thread/161214?ContentTypeID=1</link><pubDate>Tue, 11 Dec 2018 13:28:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e53b5863-54be-4343-af44-77414598db79</guid><dc:creator>Avamander</dc:creator><description>&lt;p&gt;Thanks for the reply!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: What precautions can be taken to avoid getting compromised due to the proprietary radio stack?</title><link>https://devzone.nordicsemi.com/thread/161142?ContentTypeID=1</link><pubDate>Tue, 11 Dec 2018 09:11:57 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ed6988e3-461d-4f4c-816f-9879cb90ab73</guid><dc:creator>haakonsh</dc:creator><description>&lt;p&gt;All RAM used by the SoftDevice (0x2000000 to APP_RAM_BASE - 1) is protected using the MWU. See section &amp;#39;Memory isolation and runtime protection &amp;#39; in the s140 sds&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: What precautions can be taken to avoid getting compromised due to the proprietary radio stack?</title><link>https://devzone.nordicsemi.com/thread/161041?ContentTypeID=1</link><pubDate>Mon, 10 Dec 2018 15:13:14 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5427b480-9540-439e-96a1-5951745276ec</guid><dc:creator>Avamander</dc:creator><description>&lt;p&gt;But how would one avoid malicious reads of RAM that could be caused by a bug in SDs? Or is that not a risk?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: What precautions can be taken to avoid getting compromised due to the proprietary radio stack?</title><link>https://devzone.nordicsemi.com/thread/161007?ContentTypeID=1</link><pubDate>Mon, 10 Dec 2018 13:56:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:82f03ce0-81be-45e7-ae7a-17a7f9e8e449</guid><dc:creator>haakonsh</dc:creator><description>&lt;p&gt;You need to use a secure DFU with a secure bootloader, use the latest version of our SoftDevices, use LE Secure Connections, and enable readback protection.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;The nRF52840 has an&amp;nbsp;&lt;a href="https://www.nordicsemi.com/en/DocLib/Content/Product_Spec/nRF52840/latest/acl?237#concept_gdr_qlx_vr"&gt;ACL — Access control lists&lt;/a&gt;&amp;nbsp;that can prevent the CPU from reading and/or writing to a region of flash. ie you can protect you application from getting overwritten by malicious code. The only way to disable the ACL is to reset the device. It&amp;#39;s then up to your secure bootloader to enable the ACL and verifying the application before booting it.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;The nRF52840 also has an ARM CC310 cryptocell that enables the MCU to establish a root of trust in a key stored in flash. The secure bootloader can store a key in the CC310s SRAM and use ACL to prevent the CPU from reading the key that is stored in flash.&amp;nbsp;&lt;br /&gt;The only way to get to this key is an optical read of the flash.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>