CAPEC-516: Hardware Component Substitution During Baselining
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
An adversary with access to system components during allocated baseline development can substitute a maliciously altered hardware component for a baseline component during the product development and research phases. This can lead to adjustments and calibrations being made in the product so that when the final product, now containing the modified component, is deployed it will not perform as designed and be advantageous to the adversary.
前提条件
- The adversary will need either physical access or be able to supply malicious hardware components to the product development facility.
所需技能
缓解措施
Hardware attacks are often difficult to detect, as inserted components can be difficult to identify or remain dormant for an extended period of time.
Acquire hardware and hardware components from trusted vendors. Additionally, determine where vendors purchase components or if any components are created/acquired via subcontractors to determine where supply chain risks may exist.
分类映射
| 分类名称 | 条目ID | 条目名称 |
|---|---|---|
| ATTACK | 1195.003 | Supply Chain Compromise: Compromise Hardware Supply Chain |