Commit 7eee42b4 authored by Marius Gläß's avatar Marius Gläß
Browse files

Now including the list; issue from earlier commit

parent 19249030
Loading
Loading
Loading
Loading
+58 −0
Original line number Diff line number Diff line
@@ -889,6 +889,64 @@ and authenticated

From [MITRE EMB3D](https://emb3d.mitre.org/):


Hardware:
(Hardware-related threats that can have mitigations in software)
+ [TID-101](https://emb3d.mitre.org/threats/TID-101.html): Power Consumption Analysis Side Channel
* [TID-102](https://emb3d.mitre.org/threats/TID-102.html): Electromagnetic Analysis Side Channel
* [TID-103](https://emb3d.mitre.org/threats/TID-103.html): Microarchitectural Side Channels
* [TID-105](https://emb3d.mitre.org/threats/TID-105.html): Hardware Fault Injection – Control Flow Modification
* [TID-110](https://emb3d.mitre.org/threats/TID-110.html): Hardware Fault Injection – Data Manipulation
* [TID-111](https://emb3d.mitre.org/threats/TID-111.html): Untrusted External Storage
* [TID-113](https://emb3d.mitre.org/threats/TID-113.html): Unverified Peripheral Firmware Loaded

System Software
* [TID-201](https://emb3d.mitre.org/threats/TID-201.html): Inadequate Bootloader Protection and Verification
* [TID-202](https://emb3d.mitre.org/threats/TID-202.html): Exploitable System Network Stack Component
* [TID-203](https://emb3d.mitre.org/threats/TID-203.html): Malicious OS Kernel Driver/Module Installable
* [TID-204](https://emb3d.mitre.org/threats/TID-204.html): Untrusted Programs Can Access Privileged OS Functions
* [TID-205](https://emb3d.mitre.org/threats/TID-205.html): Existing OS Tools Maliciously Used for Device Manipulation
* [TID-206](https://emb3d.mitre.org/threats/TID-206.html): Memory Management Protections Subverted
* [TID-207](https://emb3d.mitre.org/threats/TID-207.html): Container Escape
* [TID-208](https://emb3d.mitre.org/threats/TID-208.html): Virtual Machine Escape
* [TID-209](https://emb3d.mitre.org/threats/TID-209.html): Host Can Manipulate Guest Virtual Machines

(not relevant if we assume patching capabilities?)
* [TID-210](https://emb3d.mitre.org/threats/TID-210.html): Device Vulnerabilities Unpatchable

(to what extend is secure FW update and software only bootloader OSes responsibility?)
* [TID-211](https://emb3d.mitre.org/threats/TID-211.html): Device Allows Unauthenticated Firmware Installation
* [TID-212](https://emb3d.mitre.org/threats/TID-212.html): FW/SW Update Integrity Shared Secrets Extraction
* [TID-213](https://emb3d.mitre.org/threats/TID-213.html): Faulty FW/SW Update Integrity Verification
* [TID-215](https://emb3d.mitre.org/threats/TID-215.html): Unencrypted SW/FW Updates
* [TID-216](https://emb3d.mitre.org/threats/TID-216.html): Firmware Update Rollbacks Allowed (?)
* [TID-217](https://emb3d.mitre.org/threats/TID-217.html): Remotely Initiated Updates Can Cause DoS
* [TID-218](https://emb3d.mitre.org/threats/TID-218.html): Operating System Susceptible to Rootkit
* [TID-219](https://emb3d.mitre.org/threats/TID-219.html): OS/Kernel Privilege Escalation
* [TID-221](https://emb3d.mitre.org/threats/TID-221.html): Authentication Bypass By Message Replay
* [TID-222](https://emb3d.mitre.org/threats/TID-222.html): Critical System Service May Be Disabled
* [TID-223](https://emb3d.mitre.org/threats/TID-223.html): System Susceptible to RAM Scraping (?)
* [TID-224](https://emb3d.mitre.org/threats/TID-224.html): Excessive Access via Software Diagnostic Features
* [TID-225](https://emb3d.mitre.org/threats/TID-225.html): Logs can be manipulated on the device
* [TID-226](https://emb3d.mitre.org/threats/TID-226.html): Device leaks security information in logs


Application Level
* [TID-301](https://emb3d.mitre.org/threats/TID-301.html): Applications Binaries Modified
* [TID-302](https://emb3d.mitre.org/threats/TID-302.html): Install Untrusted Application
* [TID-303](https://emb3d.mitre.org/threats/TID-303.html): Excessive Trust in Offboard Management/IDE Software (not sure if this is relevant to OS in general)
* [TID-304](https://emb3d.mitre.org/threats/TID-304.html): Manipulate Runtime Environment
* [TID-305](https://emb3d.mitre.org/threats/TID-305.html): Program Executes Dangerous System Calls
* [TID-306](https://emb3d.mitre.org/threats/TID-306.html): Sandboxed Environments Escaped

(the following require "Device includes support for "program uploads" to retrieve programs from the device from an engineering workstation")
* [TID-307](https://emb3d.mitre.org/threats/TID-307.html): Device Code Representations Inconsistent (quite a specific case)
* [TID-308](https://emb3d.mitre.org/threats/TID-308.html): Code Overwritten to Avoid Detection
* [TID-309](https://emb3d.mitre.org/threats/TID-309.html): Device Exploits Engineering Workstation
* [TID-310](https://emb3d.mitre.org/threats/TID-310.html): Remotely Accessible Unauthenticated Services
* [TID-313](https://emb3d.mitre.org/threats/TID-313.html): Unauthenticated Session Changes Credential
* ...

<mark> FIXME list more threats </mark>

## C.3 Assumptions