> List assumptions that are relevant to the risk analysis for these threats. Everything is hackable if you try hard enough. What kinds of threats are in and out of scope? What are you assuming is the sophistication of attack? Relate to use cases.
@@ -2631,6 +2540,97 @@ Random ideas
* Opt-in for all network functionality
* What about commonly disabled features for minimization
From [MITRE EMB3D](https://emb3d.mitre.org/):
Hardware:
*[TID-101](https://emb3d.mitre.org/threats/TID-101.html): Power Consumption Analysis Side Channel
*[TID-102](https://emb3d.mitre.org/threats/TID-102.html): Electromagnetic Analysis Side Channel
*[TID-103](https://emb3d.mitre.org/threats/TID-103.html): Microarchitectural Side Channels
*[TID-105](https://emb3d.mitre.org/threats/TID-105.html): Hardware Fault Injection – Control Flow Modification
*[TID-106](https://emb3d.mitre.org/threats/TID-106.html): Data Bus Interception
*[TID-107](https://emb3d.mitre.org/threats/TID-107.html): Unauthorized Direct Memory Access (DMA)
*[TID-108](https://emb3d.mitre.org/threats/TID-108.html): ROM/NVRAM Data Extraction or Modification