Software MITRE EMB3D and ADF Mapping
Device includes a bootloader (MITRE EM3ED PID-21)
Bootloader
- Keys: Bootloader | Bootloader Execution
- Description: Bootloader execution
-
Attack Vectors and Threats:
-
FI (MITRE EM3ED TID-110)
-
Side-Channel Leakage (MITRE EM3ED TID-330)
-
Buffer Manipulation (MITRE EM3ED TID-327)
-
Timing Attack (MITRE EM3ED TID-330)
-
Inadequate Bootloader Protection and Verification (MITRE EM3ED TID-201)
-
Device includes peripheral chips and integrated data buses (MITRE EM3ED PID-13)
BUS
- Keys: BUS
- Description: Shared BUS
-
Attack Vectors and Threats:
-
Memory (MITRE EM3ED TID-206)
-
Unverified Peripheral Firmware Loaded (MITRE EM3ED TID-113)
-
Peripheral Data Bus Interception (MITRE EM3ED TID-114)
-
Device includes support for manual memory management programming languages (e.g. C, C++) (MITRE EM3ED PID-3122)
Non-Volatile Memory
- Keys: Non-Volatile Memory | Memory Management
- Description: Memory management issues
-
Attack Vectors and Threats:
-
Buffer Manipulation (MITRE EM3ED TID-327)
-
Malicious Firmware (MITRE EM3ED TID-203)
-
Out of Bounds Memory Access (MITRE EM3ED TID-327)
-
Device includes a microprocessor (MITRE EM3ED PID-11)
Cache Memory
- Keys: Cache Memory | Cache
- Description: Shared memory between victim and attacker
-
Attack Vectors and Threats:
-
Cache State (MITRE EM3ED TID-103)
-
Memory
- Keys: Memory | Shared Memory
- Description: Shared memory between victim and attacker
-
Attack Vectors and Threats:
Cryptographic Algorithm Implementation
- Keys: Cryptographic Algorithm Implementation | Cryptographic Operation
- Description: Cryptographic algorithm implementation emits exploitable information to the side-channel
-
Attack Vectors and Threats:
-
Side-Channel Leakage (MITRE EM3ED TID-330)
-
Interrupt Capabilities
- Keys: Interrupt Capabilities
- Description: Attacker can utilize target interrupt capabilities
-
Attack Vectors and Threats:
Priviledged Mode
- Keys: Priviledged Mode
- Description: Attacker can utilize target priviledged execution mode
-
Attack Vectors and Threats:
Hyperthreading
- Keys: Hyperthreading
- Description: Attacker and victim share the same core
-
Attack Vectors and Threats:
-
Code Execution (MITRE EM3ED TID-301)
-
Power Consumption Analysis Side Channel (MITRE EM3ED TID-101)
-
Electromagnetic Analysis Side Channel (MITRE EM3ED TID-102)
-
Microarchitectural Side Channels (MITRE EM3ED TID-103)
-
Hardware Fault Injection – Control Flow Modification (MITRE EM3ED TID-105)
-
Device includes software/hardware root of trust (MITRE EM3ED PID-25)
Firmware RoT
- Keys: Firmware RoT | Firmware RoT
- Description: Device includes software root of trust
-
Attack Vectors and Threats:
-
Malicious Firmware (MITRE EM3ED TID-203)
-
Device includes a hardware access port (e.g., UART, JTAG) (MITRE EM3ED PID-15)
Debug Interface
- Keys: Debug Interface
- Description: Debug Interface provides acces to internal units
-
Attack Vectors and Threats:
-
FI (MITRE EM3ED TID-110)
-
Firmware/Data Extraction via Hardware Interface (MITRE EM3ED TID-115)
-
Latent Privileged Access Port (MITRE EM3ED TID-116)
-
Latent Hardware Debug Port Allows Memory/Code Manipulation (MITRE EM3ED TID-119)
-