Physical Threat Model
Device includes a microprocessor (MITRE EM3ED PID-11)
Cryptographic Algorithm Implementation
- Keys: Cryptographic Algorithm Implementation | Cryptographic Algorithm Implementation | Cryptographic Operation
- Description: Cryptographic algorithm implementation emits exploitable information to the side-channel
-
Attack Vectors and Threats:
-
Power Side-Channel (MITRE EM3ED TID-101)
-
Electromagnetic Side-Channel (MITRE EM3ED TID-102)
-
FA (MITRE EM3ED TID-105)
-
SEM (MITRE EM3ED TID-102)
-
Controller Implementation
- Keys: Controller Implementation | Controller Implementation | CPU Implementation | CPU | MCU | Microprocessor | SoC
- Description: Controller/CPU Implementation missbehaviour can disclose sensitive data
-
Attack Vectors and Threats:
-
FA (MITRE EM3ED TID-105)
-
FIB (MITRE EM3ED TID-105)
-
Countermeasure Implementation
- Keys: Countermeasure Implementation | Counter-measure Implementation
- Description: Disabling countermeasure leads to making the device vulnerable again
-
Attack Vectors and Threats:
Speculation
- Keys: Speculation | Speculative HW
- Description: Optimizations leading to speculative execution in the hardware
-
Attack Vectors and Threats:
-
Speculative Execution (MITRE EM3ED TID-103)
-
Power Consumption Analysis Side Channel (MITRE EM3ED TID-101)
-
Electromagnetic Analysis Side Channel (MITRE EM3ED TID-102)
-
Microarchitectural Side Channels (MITRE EM3ED TID-103)
-
Hardware Fault Injection – Control Flow Modification (MITRE EM3ED TID-105)
-
Device includes Memory/Storage (external to CPU) (MITRE EM3ED PID-12)
Memory
- Keys: Memory | Non-Volatile Memory
- Description: Device includes memory/storage external to CPU
-
Attack Vectors and Threats:
-
FA (MITRE EM3ED TID-105)
-
FIB (MITRE EM3ED TID-105)
-
ROM Extraction (MITRE EM3ED TID-108)
-
SEM (MITRE EM3ED TID-102)
-
Private Key
- Keys: Private Key | private key
- Description: Device contains memory, where sensitive data are stored
-
Attack Vectors and Threats:
EM3ED-only: Device includes buses for external memory/storage (MITRE EM3ED PID-121)
-
Attack Vectors and Threats:
- Data Bus Interception (MITRE EM3ED TID-106)
EM3ED-only: Device includes discrete chips/devices that have access to the same physical memory (MITRE EM3ED PID-122)
-
Attack Vectors and Threats:
- Unauthorized Direct Memory Access (DMA) (MITRE EM3ED TID-107)
EM3ED-only: Device includes ROM, VRAM, or removable Storage (MITRE EM3ED PID-123)
-
Attack Vectors and Threats:
- ROM/NVRAM Data Extraction or Modification (MITRE EM3ED TID-108)
EM3ED-only: Device includes Random Access Memory (RAM) chips (MITRE EM3ED PID-124)
-
Attack Vectors and Threats:
- RAM Chip Contents Readout (MITRE EM3ED TID-109)
EM3ED-only: Device includes DDR DRAM (MITRE EM3ED PID-1241)
-
Attack Vectors and Threats:
- Hardware Fault Injection – Data Manipulation (MITRE EM3ED TID-110)
EM3ED-only: Device includes peripheral chips and integrated data buses (MITRE EM3ED PID-13)
-
Attack Vectors and Threats:
-
Unverified Peripheral Firmware Loaded (MITRE EM3ED TID-113)
-
Peripheral Data Bus Interception (MITRE EM3ED TID-114)
-
EM3ED-only: Device includes external peripheral interconnects (e.g., USB, Serial) (MITRE EM3ED PID-14)
-
Attack Vectors and Threats:
-
Untrusted External Storage (MITRE EM3ED TID-111)
-
Weak Peripheral Port Electrical Damage Protection (MITRE EM3ED TID-118)
-
Device includes a hardware access port (e.g., UART, JTAG) (MITRE EM3ED PID-15)
Debug Interface
- Keys: Debug Interface
- Description: Debug Interface provides acces to internal units
-
Attack Vectors and Threats:
-
FIB (MITRE EM3ED TID-105)
-
Privileged Access Port (MITRE EM3ED TID-116)
-
Firmware/Data Extraction via Hardware Interface (MITRE EM3ED TID-115)
-
Latent Privileged Access Port (MITRE EM3ED TID-116)
-
Latent Hardware Debug Port Allows Memory/Code Manipulation (MITRE EM3ED TID-119)
-
EM3ED-only: Device includes a debugging capabilities (MITRE EM3ED PID-22)
-
Attack Vectors and Threats:
- Excessive Access via Software Diagnostic Features (MITRE EM3ED TID-224)