Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
threat_model: Update Hardware Result Attacker
Add assumptions and mitigations to the attacker: * Assumption: For a hardware attacker, it does not make sense to assume as a mitigation that the SOFTWARE configuration has been done with correct permissions. We replace it with a HARDWARE assumption that only trusted agents can physically access the system. * Asset: We add the key mappings (and the wrapped TPM key) as a Hardware Result asset involved with this attacker. Signed-off-by: Tomás González <[email protected]>
- Loading branch information