Skip to content

Commit

Permalink
Automated deployment: Wed Apr 3 09:57:44 UTC 2024 d970f61
Browse files Browse the repository at this point in the history
  • Loading branch information
tgonzalezorlandoarm committed Apr 3, 2024
1 parent 075aa68 commit 31edf70
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion parsec_security/parsec_threat_model/threat_model.html
Original file line number Diff line number Diff line change
Expand Up @@ -349,7 +349,7 @@ <h3 id="attacker-hardware-result---a5"><a class="header" href="#attacker-hardwar
<p>This attacker communicates with the service using the operating system interfaces for hardware. It
can also create a spoofed hardware interface.</p>
<div class="table-wrapper"><table><thead><tr><th></th><th>Description</th><th>Mitigation</th><th>Assets</th></tr></thead><tbody>
<tr><td>S</td><td>An attacker impersonates a hardware module or uses a malicious module plugged to the machine.</td><td>O-1, ASUM-2</td><td>AS4, AS6</td></tr>
<tr><td>S</td><td>An attacker impersonates a hardware module or uses a malicious module plugged to the machine.</td><td>O-1, ASUM-1</td><td>AS4, AS6, AS7</td></tr>
<tr><td>T</td><td>An attacker modifies the response of a hardware command.</td><td>O-8, U-3, M-10</td><td>AS4, AS6</td></tr>
<tr><td>R</td><td>Responses cannot be proven to originate from the hardware module.</td><td>U-7</td><td></td></tr>
<tr><td>I</td><td>An attacker can read the content of a command response.</td><td>U-3, M-10, O-8</td><td>AS3, AS4, AS5</td></tr>
Expand Down
2 changes: 1 addition & 1 deletion print.html
Original file line number Diff line number Diff line change
Expand Up @@ -4692,7 +4692,7 @@ <h3 id="attacker-hardware-result---a5"><a class="header" href="#attacker-hardwar
<p>This attacker communicates with the service using the operating system interfaces for hardware. It
can also create a spoofed hardware interface.</p>
<div class="table-wrapper"><table><thead><tr><th></th><th>Description</th><th>Mitigation</th><th>Assets</th></tr></thead><tbody>
<tr><td>S</td><td>An attacker impersonates a hardware module or uses a malicious module plugged to the machine.</td><td>O-1, ASUM-2</td><td>AS4, AS6</td></tr>
<tr><td>S</td><td>An attacker impersonates a hardware module or uses a malicious module plugged to the machine.</td><td>O-1, ASUM-1</td><td>AS4, AS6, AS7</td></tr>
<tr><td>T</td><td>An attacker modifies the response of a hardware command.</td><td>O-8, U-3, M-10</td><td>AS4, AS6</td></tr>
<tr><td>R</td><td>Responses cannot be proven to originate from the hardware module.</td><td>U-7</td><td></td></tr>
<tr><td>I</td><td>An attacker can read the content of a command response.</td><td>U-3, M-10, O-8</td><td>AS3, AS4, AS5</td></tr>
Expand Down
2 changes: 1 addition & 1 deletion searchindex.js

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion searchindex.json

Large diffs are not rendered by default.

0 comments on commit 31edf70

Please sign in to comment.