- Protection of the embedded secrets against professional hackers stealing actions
- Protection of Non-Volatile-Memory to make sure that pirates:
1. Do not access the code (boot loader, test functions) which could be used to extract the embedded software or data
2. Can not extract the embedded software which would allow them to:
- Gain information to be able to easily perform cheaper attacks
- Emulate the code on another device
3. Have no access to user data
- Great efficiency: needs very little silicon area, consumes very low energy and does not degrade the IC performance
- 100% Hardware based: does not require extra-software design as it relies on the IC itself