Loading EN-304-626.md +58 −0 Original line number Diff line number Diff line Loading @@ -889,6 +889,64 @@ and authenticated From [MITRE EMB3D](https://emb3d.mitre.org/): Hardware: (Hardware-related threats that can have mitigations in software) + [TID-101](https://emb3d.mitre.org/threats/TID-101.html): Power Consumption Analysis Side Channel * [TID-102](https://emb3d.mitre.org/threats/TID-102.html): Electromagnetic Analysis Side Channel * [TID-103](https://emb3d.mitre.org/threats/TID-103.html): Microarchitectural Side Channels * [TID-105](https://emb3d.mitre.org/threats/TID-105.html): Hardware Fault Injection – Control Flow Modification * [TID-110](https://emb3d.mitre.org/threats/TID-110.html): Hardware Fault Injection – Data Manipulation * [TID-111](https://emb3d.mitre.org/threats/TID-111.html): Untrusted External Storage * [TID-113](https://emb3d.mitre.org/threats/TID-113.html): Unverified Peripheral Firmware Loaded System Software * [TID-201](https://emb3d.mitre.org/threats/TID-201.html): Inadequate Bootloader Protection and Verification * [TID-202](https://emb3d.mitre.org/threats/TID-202.html): Exploitable System Network Stack Component * [TID-203](https://emb3d.mitre.org/threats/TID-203.html): Malicious OS Kernel Driver/Module Installable * [TID-204](https://emb3d.mitre.org/threats/TID-204.html): Untrusted Programs Can Access Privileged OS Functions * [TID-205](https://emb3d.mitre.org/threats/TID-205.html): Existing OS Tools Maliciously Used for Device Manipulation * [TID-206](https://emb3d.mitre.org/threats/TID-206.html): Memory Management Protections Subverted * [TID-207](https://emb3d.mitre.org/threats/TID-207.html): Container Escape * [TID-208](https://emb3d.mitre.org/threats/TID-208.html): Virtual Machine Escape * [TID-209](https://emb3d.mitre.org/threats/TID-209.html): Host Can Manipulate Guest Virtual Machines (not relevant if we assume patching capabilities?) * [TID-210](https://emb3d.mitre.org/threats/TID-210.html): Device Vulnerabilities Unpatchable (to what extend is secure FW update and software only bootloader OSes responsibility?) * [TID-211](https://emb3d.mitre.org/threats/TID-211.html): Device Allows Unauthenticated Firmware Installation * [TID-212](https://emb3d.mitre.org/threats/TID-212.html): FW/SW Update Integrity Shared Secrets Extraction * [TID-213](https://emb3d.mitre.org/threats/TID-213.html): Faulty FW/SW Update Integrity Verification * [TID-215](https://emb3d.mitre.org/threats/TID-215.html): Unencrypted SW/FW Updates * [TID-216](https://emb3d.mitre.org/threats/TID-216.html): Firmware Update Rollbacks Allowed (?) * [TID-217](https://emb3d.mitre.org/threats/TID-217.html): Remotely Initiated Updates Can Cause DoS * [TID-218](https://emb3d.mitre.org/threats/TID-218.html): Operating System Susceptible to Rootkit * [TID-219](https://emb3d.mitre.org/threats/TID-219.html): OS/Kernel Privilege Escalation * [TID-221](https://emb3d.mitre.org/threats/TID-221.html): Authentication Bypass By Message Replay * [TID-222](https://emb3d.mitre.org/threats/TID-222.html): Critical System Service May Be Disabled * [TID-223](https://emb3d.mitre.org/threats/TID-223.html): System Susceptible to RAM Scraping (?) * [TID-224](https://emb3d.mitre.org/threats/TID-224.html): Excessive Access via Software Diagnostic Features * [TID-225](https://emb3d.mitre.org/threats/TID-225.html): Logs can be manipulated on the device * [TID-226](https://emb3d.mitre.org/threats/TID-226.html): Device leaks security information in logs Application Level * [TID-301](https://emb3d.mitre.org/threats/TID-301.html): Applications Binaries Modified * [TID-302](https://emb3d.mitre.org/threats/TID-302.html): Install Untrusted Application * [TID-303](https://emb3d.mitre.org/threats/TID-303.html): Excessive Trust in Offboard Management/IDE Software (not sure if this is relevant to OS in general) * [TID-304](https://emb3d.mitre.org/threats/TID-304.html): Manipulate Runtime Environment * [TID-305](https://emb3d.mitre.org/threats/TID-305.html): Program Executes Dangerous System Calls * [TID-306](https://emb3d.mitre.org/threats/TID-306.html): Sandboxed Environments Escaped (the following require "Device includes support for "program uploads" to retrieve programs from the device from an engineering workstation") * [TID-307](https://emb3d.mitre.org/threats/TID-307.html): Device Code Representations Inconsistent (quite a specific case) * [TID-308](https://emb3d.mitre.org/threats/TID-308.html): Code Overwritten to Avoid Detection * [TID-309](https://emb3d.mitre.org/threats/TID-309.html): Device Exploits Engineering Workstation * [TID-310](https://emb3d.mitre.org/threats/TID-310.html): Remotely Accessible Unauthenticated Services * [TID-313](https://emb3d.mitre.org/threats/TID-313.html): Unauthenticated Session Changes Credential * ... <mark> FIXME list more threats </mark> ## C.3 Assumptions Loading Loading
EN-304-626.md +58 −0 Original line number Diff line number Diff line Loading @@ -889,6 +889,64 @@ and authenticated From [MITRE EMB3D](https://emb3d.mitre.org/): Hardware: (Hardware-related threats that can have mitigations in software) + [TID-101](https://emb3d.mitre.org/threats/TID-101.html): Power Consumption Analysis Side Channel * [TID-102](https://emb3d.mitre.org/threats/TID-102.html): Electromagnetic Analysis Side Channel * [TID-103](https://emb3d.mitre.org/threats/TID-103.html): Microarchitectural Side Channels * [TID-105](https://emb3d.mitre.org/threats/TID-105.html): Hardware Fault Injection – Control Flow Modification * [TID-110](https://emb3d.mitre.org/threats/TID-110.html): Hardware Fault Injection – Data Manipulation * [TID-111](https://emb3d.mitre.org/threats/TID-111.html): Untrusted External Storage * [TID-113](https://emb3d.mitre.org/threats/TID-113.html): Unverified Peripheral Firmware Loaded System Software * [TID-201](https://emb3d.mitre.org/threats/TID-201.html): Inadequate Bootloader Protection and Verification * [TID-202](https://emb3d.mitre.org/threats/TID-202.html): Exploitable System Network Stack Component * [TID-203](https://emb3d.mitre.org/threats/TID-203.html): Malicious OS Kernel Driver/Module Installable * [TID-204](https://emb3d.mitre.org/threats/TID-204.html): Untrusted Programs Can Access Privileged OS Functions * [TID-205](https://emb3d.mitre.org/threats/TID-205.html): Existing OS Tools Maliciously Used for Device Manipulation * [TID-206](https://emb3d.mitre.org/threats/TID-206.html): Memory Management Protections Subverted * [TID-207](https://emb3d.mitre.org/threats/TID-207.html): Container Escape * [TID-208](https://emb3d.mitre.org/threats/TID-208.html): Virtual Machine Escape * [TID-209](https://emb3d.mitre.org/threats/TID-209.html): Host Can Manipulate Guest Virtual Machines (not relevant if we assume patching capabilities?) * [TID-210](https://emb3d.mitre.org/threats/TID-210.html): Device Vulnerabilities Unpatchable (to what extend is secure FW update and software only bootloader OSes responsibility?) * [TID-211](https://emb3d.mitre.org/threats/TID-211.html): Device Allows Unauthenticated Firmware Installation * [TID-212](https://emb3d.mitre.org/threats/TID-212.html): FW/SW Update Integrity Shared Secrets Extraction * [TID-213](https://emb3d.mitre.org/threats/TID-213.html): Faulty FW/SW Update Integrity Verification * [TID-215](https://emb3d.mitre.org/threats/TID-215.html): Unencrypted SW/FW Updates * [TID-216](https://emb3d.mitre.org/threats/TID-216.html): Firmware Update Rollbacks Allowed (?) * [TID-217](https://emb3d.mitre.org/threats/TID-217.html): Remotely Initiated Updates Can Cause DoS * [TID-218](https://emb3d.mitre.org/threats/TID-218.html): Operating System Susceptible to Rootkit * [TID-219](https://emb3d.mitre.org/threats/TID-219.html): OS/Kernel Privilege Escalation * [TID-221](https://emb3d.mitre.org/threats/TID-221.html): Authentication Bypass By Message Replay * [TID-222](https://emb3d.mitre.org/threats/TID-222.html): Critical System Service May Be Disabled * [TID-223](https://emb3d.mitre.org/threats/TID-223.html): System Susceptible to RAM Scraping (?) * [TID-224](https://emb3d.mitre.org/threats/TID-224.html): Excessive Access via Software Diagnostic Features * [TID-225](https://emb3d.mitre.org/threats/TID-225.html): Logs can be manipulated on the device * [TID-226](https://emb3d.mitre.org/threats/TID-226.html): Device leaks security information in logs Application Level * [TID-301](https://emb3d.mitre.org/threats/TID-301.html): Applications Binaries Modified * [TID-302](https://emb3d.mitre.org/threats/TID-302.html): Install Untrusted Application * [TID-303](https://emb3d.mitre.org/threats/TID-303.html): Excessive Trust in Offboard Management/IDE Software (not sure if this is relevant to OS in general) * [TID-304](https://emb3d.mitre.org/threats/TID-304.html): Manipulate Runtime Environment * [TID-305](https://emb3d.mitre.org/threats/TID-305.html): Program Executes Dangerous System Calls * [TID-306](https://emb3d.mitre.org/threats/TID-306.html): Sandboxed Environments Escaped (the following require "Device includes support for "program uploads" to retrieve programs from the device from an engineering workstation") * [TID-307](https://emb3d.mitre.org/threats/TID-307.html): Device Code Representations Inconsistent (quite a specific case) * [TID-308](https://emb3d.mitre.org/threats/TID-308.html): Code Overwritten to Avoid Detection * [TID-309](https://emb3d.mitre.org/threats/TID-309.html): Device Exploits Engineering Workstation * [TID-310](https://emb3d.mitre.org/threats/TID-310.html): Remotely Accessible Unauthenticated Services * [TID-313](https://emb3d.mitre.org/threats/TID-313.html): Unauthenticated Session Changes Credential * ... <mark> FIXME list more threats </mark> ## C.3 Assumptions Loading