mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-09 23:26:29 -04:00
Threat Model: adjust modality
Signed-off-by: Janos Follath <janos.follath@arm.com>
This commit is contained in:
parent
e3d677c6aa
commit
6cd045905f
20
SECURITY.md
20
SECURITY.md
@ -25,9 +25,10 @@ We classify attacks based on the capabilities of the attacker.
|
|||||||
|
|
||||||
### Remote attacks
|
### Remote attacks
|
||||||
|
|
||||||
The attacker can observe and modify data sent over the network. This includes
|
In this section, we consider an attacker who can observe and modify data sent
|
||||||
observing the content and timing of individual packets, as well as suppressing
|
over the network. This includes observing the content and timing of individual
|
||||||
or delaying legitimate messages, and injecting messages.
|
packets, as well as suppressing or delaying legitimate messages, and injecting
|
||||||
|
messages.
|
||||||
|
|
||||||
Mbed TLS aims to fully protect against remote attacks and to enable the user
|
Mbed TLS aims to fully protect against remote attacks and to enable the user
|
||||||
application in providing full protection against remote attacks. Said
|
application in providing full protection against remote attacks. Said
|
||||||
@ -42,9 +43,9 @@ and workarounds see the [Block Ciphers](#block-ciphers) section.
|
|||||||
|
|
||||||
### Local attacks
|
### Local attacks
|
||||||
|
|
||||||
The attacker can run software on the same machine. The attacker has
|
In this section, we consider an attacker who can run software on the same
|
||||||
insufficient privileges to directly access Mbed TLS assets such as memory and
|
machine. The attacker has insufficient privileges to directly access Mbed TLS
|
||||||
files.
|
assets such as memory and files.
|
||||||
|
|
||||||
#### Timing attacks
|
#### Timing attacks
|
||||||
|
|
||||||
@ -93,9 +94,10 @@ application's threat model, they need to be mitigated by the platform.
|
|||||||
|
|
||||||
### Physical attacks
|
### Physical attacks
|
||||||
|
|
||||||
The attacker has access to physical information about the hardware Mbed TLS is
|
In this section, we consider an attacker who can attacker has access to
|
||||||
running on and/or can alter the physical state of the hardware (e.g. power
|
physical information about the hardware Mbed TLS is running on and/or can alter
|
||||||
analysis, radio emissions or fault injection).
|
the physical state of the hardware (e.g. power analysis, radio emissions or
|
||||||
|
fault injection).
|
||||||
|
|
||||||
Mbed TLS doesn't make any security guarantees against physical attacks. If
|
Mbed TLS doesn't make any security guarantees against physical attacks. If
|
||||||
physical attacks are present in a use case or a user application's threat
|
physical attacks are present in a use case or a user application's threat
|
||||||
|
Loading…
x
Reference in New Issue
Block a user