C-Trust
Extension to IAR Embedded Workbench which enables you to protect your application and deliver secure, encrypted code, without having to master the deeper complexities of security.
Automatic Encrypted Code
C-Trust enables every application developer to deliver secure, encrypted code without having to master the deeper complexities of security.
Integrated with IAR Embedded Workbench
C-Trust works as extension to IAR Embedded Workbench. Each time a project is build, the executable is mastered (encrypted and signed) automatically. A download-and-debug puts the encrypted/signed code into an update slot and the ready-made Secure Boot Manager decrypts and bootloads the code directly on the device.
Preconfigured Security Contexts Included
C-Trust uses the innovative Security Contexts technology to help you with protecting your application. A Security Context defines the configuration of a trusted execution environment by describing the security environment that is required to protect an application.
Stand-Alone Mode
C-RUN can be used standalone to find ”hard to detect” problems in the field. It only requires to build and deploy a test firmware for a unit with the necessary C-RUN tests enabled in IAR Embedded Workbench. The C-RUN output messages will then be redirected to a serial interface and log the messages. The recorded cryptic messages can then be parsed offline to plaintext with the C-SPY command line utility (cspybat) for diagnosis and bug fixing.
Security just a Tickbox Away
Correct security and encryption settings are automatically enforced with C-Trust according to the Security Context, enabling you as application developer to focus on the functionality of the application.
Supported Devices
IAR Systems security tools and services offer support for a wide range of devices, including Arm-based MCUs from STMicroelectronics, Renesas and NXP, as well as the Renesas RX MCU family devices, enabling you to choose the right MCU for the security and functional needs of your application. In addition, support for the vast majority of MCUs can be achieved through the use of Hardware Abstraction Layer (HAL).
All devices in the list are ported and tested.
IAR Systems are constantly updating their growing list of supported devices. If your device is not listed, contact us to find out when your device will be supported.

Innovative Security Context technology
A Security Context defines the configuration of a trusted execution environment by describing the security environment that is required to protect an application. For simplified development, C-Trust includes Preconfigured Security Contexts. With Embedded Trust, companies can define custom Security Contexts which are able to uniquely service companies’ specific needs.
Details about Security Context
C-Trust enables you as developer to use Preconfigured Security Contexts, ensuring that you remain in control of system operation today, and into the future. With Embedded Trust, companies are able to define custom Security Contexts, which uniquely service their specific needs.
Security Contexts define the configuration of the trusted execution environments. Security Contexts enable organizations to simplify:
- Complex cryptographic device identities and ownership structures
- Creation of a robust Root of Trust, ensuring device authentication, authorization and attestation, the core proofs of identity
- Implementation of security hygiene, dependant on device hardware support
- Secure Boot Manager extensions to support core boot functionality
- Application of patches, updates, and other lifecycle management criteria
- Delegation of identity for onboarding into cloud infrastructure applications
These Security Contexts provide the foundation for a set of core security concepts, enabling Security From Inception, including protection of Intellectual Property, which is about inhibiting IP theft and malware injection, and Production Control, which is about protecting keys across development and production.
Security Contexts
The Security Contexts have been designed to enable developers to rapidly protect the high value and critical IP that organizations create, and to provide reassurance that only authorized and authenticated IP can be installed on devices.
Features
