I am working with the TI Stellaris Launchpad but this question should also be applicable to the Tiva series.
I was wondering about the behaviour of the EEPROMBlockHide() function which is suggested as a means to store keys or other secrets on the board. The idea is to write a key to the EEPROM and then use EEPROMBlockHide() to make the memory section unavailable to any code afterwards. However, if an attacker would get hold of the device and re-flash the board with a firmware that simply reads out the whole EEPROM, he might be successful if the contents of the EEPROM are not deletet during the erasure of flash memory.
I tested it and it seems like the EEPROM indeed does not get deleted, which makes the protection vulnerable to such re-flashing "attacks". I know it is quite a strong adversary model. However, do you have any thoughts on it and if there are any workaround to re-establish security in such a scenario?
Thanks