Commit 9544b4af authored by Marius Gläß's avatar Marius Gläß
Browse files

Initial additions [BSI, bullet points] to threats chapter

parent 6ac6a18a
Loading
Loading
Loading
Loading
+60 −0
Original line number Diff line number Diff line
@@ -857,6 +857,66 @@ T.LOCAL ATTACK: An attacker may compromise applications running on the OS. The c

T.LIMITED PHYSICAL ACCESS An attacker may attempt to access data on the OS while having a limited amount of time with the physical device.

From BSI Common Criteria Protection Profile:

T.ACCESS.TSFDATA: A threat agent might read or modify TSF data without the necessary
authorization when the data is stored or transmitted.

T.ACCESS.USERDATA: A threat agent might gain access to user data stored, processed or
transmitted by the TOE without being appropriately authorized
according to the TOE security policy.

T.ACCESS.TSFFUNC: A threat agent might use or modify functionality of the TSF without
the necessary privilege to grant itself or others unauthorized access to
TSF data or user data.

T.ACCESS.COMM: A threat agent might access a communication channel that establishes
a trust relationship between the TOE and another remote trusted IT
system or masquerade as another remote trusted IT system.

T.RESTRICT.NETTRAFFIC: A threat agent might get access to information or transmit information
to other recipients via network communication channels without
authorization for this communication attempt by the information flow
control policy.

T.IA.MASQUERADE: A threat agent might masquerade as an authorized entity including the
TOE itself or a part of the TOE in order to gain unauthorized access to
user data, TSF data, or TOE resources.

T.IA.USER: A threat agent might gain access to user data, TSF data or TOE
resources with the exception of public objects without being identified
and authenticated

Additional threats (inspired by ENISA Threat Taxonomy):

<mark> FIXME discuss the appropriateness of the following points </mark>
<mark> FIXME categorize more clearly </mark>
<mark> FIXME check if EMB3D "format" is applicable here</mark>

Network-related threats
* Interception of information (user data, system data)
* Intercepting compromising emmission/interfering radiation/side channel
* Replay communication messages
* Network traffic manipulation

Nefarious activity
* Malicious code/software/activity
* Abuse of resources
* Worms/Trojans
* Root kits
* Elevation of privileges
* Injection attacks
* Spyware / deceptive adware
* Rogue security software
* Exploit kits
* Abuse information leaks
* Unauthorized installation of software
* Target APTs

Authentication-based threats
* Brute force
* Abuse of authorization

<mark> FIXME list more threats </mark>

## C.3 Assumptions