CAPEC-681: Exploitation of Improperly Controlled Hardware Security Identifiers
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
前提条件
- Awareness of the hardware being leveraged.
- Access to the hardware being leveraged.
所需技能
后果影响
影响范围: Integrity
技术影响: Modify Data
影响范围: Confidentiality
技术影响: Read Data
影响范围: Confidentiality Access Control Authorization
技术影响: Gain Privileges
缓解措施
Review generation of security identifiers for design inconsistencies and common weaknesses.
Review security identifier decoders for design inconsistencies and common weaknesses.
Test security identifier definition, access, and programming flow in both pre-silicon and post-silicon environments.