This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Non Secure malicious access handling...

Hello,

I'm new in the forum. I'm starting to work on Cortex-M project using trustzone (IDAU/SAU/MPU). 

I have a look to a lot of webinars and documents and I have a question regarding Non-Secure code access. In my configuration, I could set IDAU/SAU/MPU, internal ram of chip is banked to be accessed either by Non Secure state or Secure state and could be executable. In terms of mapping it could be for instance that NS access to internal RAM is 0x01XXXXXX and NSC/S access to internal RAM is 0x02XXXXXX through IDAU/SAU.

At this step, how we could avoid a malicious attack from NS region. I mean I have loaded secure code and data at address 0x02000110. This address access in NS region is 0x01000110. So what happens if NS try to read data at this address 0x01000110. It should access to Secure code / data ? I guess I miss something and would like to get some clarity on it.

Thanks,

Best Regards.