Physical MITRE EMB3D and ADF Mapping
Device includes a microprocessor (MITRE EM3ED PID-11)
Cryptographic Algorithm Implementation
- Keys: Cryptographic Algorithm Implementation | Cryptographic Algorithm Implementation | Cryptographic Operation
- Description: Cryptographic algorithm implementation emits exploitable information to the side-channel
-
Attack Vectors and Threats:
-
Power Side-Channel (MITRE EM3ED TID-101)
-
Electromagnetic Side-Channel (MITRE EM3ED TID-102)
-
FA (MITRE EM3ED TID-105)
-
SEM (MITRE EM3ED TID-102)
-
Controller Implementation
- Keys: Controller Implementation | Controller Implementation | CPU Implementation | CPU | MCU | Microprocessor | SoC
- Description: Controller/CPU Implementation missbehaviour can disclose sensitive data
-
Attack Vectors and Threats:
-
FA (MITRE EM3ED TID-105)
-
FIB (MITRE EM3ED TID-105)
-
Countermeasure Implementation
- Keys: Countermeasure Implementation | Counter-measure Implementation
- Description: Disabling countermeasure leads to making the device vulnerable again
-
Attack Vectors and Threats:
MMU
- Keys: MMU | Memory Management | Memory Management Unit
- Description: Memory management unit
-
Attack Vectors and Threats:
RSA
- Keys: RSA | Rivest–Shamir–Adleman
- Description: Rivest–Shamir–Adleman (RSA) algorithm
-
Attack Vectors and Threats:
-
Power Side-Channel (MITRE EM3ED TID-101)
-
Electromagnetic Side-Channel (MITRE EM3ED TID-102)
-
RSA Exponentiation
- Keys: RSA Exponentiation | RSA Exponentiation
- Description: Key-dependent exponentiation leads to single-trace key extraction through measuring power consumption
-
Attack Vectors and Threats:
-
Power Side-Channel (MITRE EM3ED TID-101)
-
Electromagnetic Side-Channel (MITRE EM3ED TID-102)
-
ECC
- Keys: ECC | Elliptic-Curve Cryptography
- Description: Elliptic-curve cryptography (ECC)
-
Attack Vectors and Threats:
ECC Multiplication
- Keys: ECC Multiplication | ECC Multiplication
- Description: Key-dependent multiplication leads to key extraction through measuring power consumption
-
Attack Vectors and Threats:
Speculation
- Keys: Speculation | Speculative HW
- Description: Optimizations leading to speculative execution in the hardware
-
Attack Vectors and Threats:
-
Speculative Execution (MITRE EM3ED TID-103)
-
Power Consumption Analysis Side Channel (MITRE EM3ED TID-101)
-
Electromagnetic Analysis Side Channel (MITRE EM3ED TID-102)
-
Microarchitectural Side Channels (MITRE EM3ED TID-103)
-
Hardware Fault Injection – Control Flow Modification (MITRE EM3ED TID-105)
-
Device includes a hardware access port (e.g., UART, JTAG) (MITRE EM3ED PID-15)
Debug Interface
- Keys: Debug Interface
- Description: Debug Interface provides acces to internal units
-
Attack Vectors and Threats:
-
FA (MITRE EM3ED TID-105)
-
FIB (MITRE EM3ED TID-105)
-
Privileged Access Port (MITRE EM3ED TID-116)
-
Firmware/Data Extraction via Hardware Interface (MITRE EM3ED TID-115)
-
Latent Privileged Access Port (MITRE EM3ED TID-116)
-
Latent Hardware Debug Port Allows Memory/Code Manipulation (MITRE EM3ED TID-119)
-
ADF-Only Surfaces (No MITRE EM3ED PID)
FW
- Keys: FW | Firmware
- Description: Firmware missbehaviour
-
Attack Vectors and Threats:
Charge Pump
- Keys: Charge Pump
- Description: Charge Pump is a circuit that generates high voltages for memory operations, and can be a target for physical attacks (e.g., via FIB) to prevent or force data erasure.
-
Attack Vectors and Threats:
Device includes peripheral chips and integrated data buses (MITRE EM3ED PID-13)
Bus Interface
- Keys: Bus Interface
- Description: Bus interface
-
Attack Vectors and Threats:
-
FA (MITRE EM3ED TID-105)
-
Unverified Peripheral Firmware Loaded (MITRE EM3ED TID-113)
-
Peripheral Data Bus Interception (MITRE EM3ED TID-114)
-
Device includes Memory/Storage (external to CPU) (MITRE EM3ED PID-12)
Memory
- Keys: Memory | Non-Volatile Memory
- Description: Device includes memory/storage external to CPU
-
Attack Vectors and Threats:
-
FA (MITRE EM3ED TID-105)
-
FIB (MITRE EM3ED TID-105)
-
ROM Extraction (MITRE EM3ED TID-108)
-
SEM (MITRE EM3ED TID-102)
-
Private Key
- Keys: Private Key | private key
- Description: Device contains memory, where sensitive data are stored
-
Attack Vectors and Threats:
-
Power Side-Channel (MITRE EM3ED TID-101)
-
Electromagnetic Side-Channel (MITRE EM3ED TID-102)
-
FIB (MITRE EM3ED TID-105)
-
ROM Extraction (MITRE EM3ED TID-108)
-
ADF-Only Surfaces (No MITRE EM3ED PID)
FW
- Keys: FW | Firmware
- Description: Firmware missbehaviour
-
Attack Vectors and Threats:
Charge Pump
- Keys: Charge Pump
- Description: Charge Pump is a circuit that generates high voltages for memory operations, and can be a target for physical attacks (e.g., via FIB) to prevent or force data erasure.
-
Attack Vectors and Threats: