Strictly necessary cookies are on by default and cannot be turned off. Functional, Performance and Tracking/targeting/sharing cookies can be turned on below based on your preferences (this banner will remain available for you to accept cookies). You may change your cookie settings by deleting cookies from your browser. Then this banner will appear again. You can learn more details about cookies HERE.
Strictly necessary (always on)
Functional, Performance and Tracking/targeting/sharing (default off)
Possiblity of securing the contents of the EEPROM in FX1/FX2/FX2LP
Question: We have a product that uses an external EEPROM for code storage. Is there a way to secure the firmware in the EEPROM so that a hacker cannot read the EEPROM?
It is not possible to protect the contents of the EEPROM from being read. The download mechanism requires that the EEPROM be readable.There is no encoding scheme available for the download process.
If you designed the device to download via the USB (a C0 load), it would still be possible to monitor the USB traffic to extract the firmware.It is also possible to read the internal memory via a 0xA0 vendor command.