Skip to content

Commit

Permalink
Threat Model: reorganise threat definitions
Browse files Browse the repository at this point in the history
Simplify organisation by placing threat definitions in their respective
sections.

Signed-off-by: Janos Follath <[email protected]>
  • Loading branch information
yanesca committed Mar 15, 2023
1 parent e57ed98 commit 5adb2c2
Showing 1 changed file with 10 additions and 9 deletions.
19 changes: 10 additions & 9 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,17 +23,12 @@ Users are urged to always use the latest version of a maintained branch.

We use the following classification of attacks:

- **Remote Attacks:** The attacker can observe and modify data sent over the
network. This includes observing the content and timing of individual packets,
as well as suppressing or delaying legitimate messages, and injecting messages.
- **Timing Attacks:** The attacker can gain information about the time taken
by certain sets of instructions in Mbed TLS operations.
- **Physical Attacks:** The attacker has access to physical information about
the hardware Mbed TLS is running on and/or can alter the physical state of
the hardware.

### Remote attacks

The attacker can observe and modify data sent over the network. This includes
observing the content and timing of individual packets, as well as suppressing
or delaying legitimate messages, and injecting messages.

Mbed TLS aims to fully protect against remote attacks and to enable the user
application in providing full protection against remote attacks. Said
protection is limited to providing security guarantees offered by the protocol
Expand All @@ -42,6 +37,9 @@ arrive without delay, as the TLS protocol doesn't guarantee that either.)

### Timing attacks

The attacker can gain information about the time taken by certain sets of
instructions in Mbed TLS operations.

Mbed TLS provides limited protection against timing attacks. The cost of
protecting against timing attacks widely varies depending on the granularity of
the measurements and the noise present. Therefore the protection in Mbed TLS is
Expand Down Expand Up @@ -71,6 +69,9 @@ Guide](docs/architecture/alternative-implementations.md) for more information.

### Physical attacks

The attacker has access to physical information about the hardware Mbed TLS is
running on and/or can alter the physical state of the hardware.

Physical attacks are out of scope (eg. power analysis or radio emissions). Any
attack using information about or influencing the physical state of the
hardware is considered physical, independently of the attack vector. (For
Expand Down

0 comments on commit 5adb2c2

Please sign in to comment.