 HoT-TAI-0024: Lack of tamper resistance
HoT-TAI-0024: Lack of tamper resistance
Summary:
Concerns with physical security range from a lack of supply chain cybersecurity and onsite physical security manipulation to the use of electronic warfare (EW) concepts described within the broader context of CEMA. Examples include:
- Implanting, embedding, or piggybacking inorganic embedded systems (e.g. microprocessors, microcontrollers, or other integrated circuits (IC)), within an IoT device to include devices that provide an out-of-band backdoor communication medium (e.g. RF technologies such as GSM within an implanted inorganic embedded system).
- Removal and reprogramming of microprocessors using desoldering and reprogramming techniques. 
 Manipulating the embedded operating system (e.g. firmware) and/or physical hardware through inter-board communication and configuration interfaces and protocols such as JTAG, SPI, I2C, UART, USB, RS-232, and Firewire.
- Manipulating ICs during the manufacturing process, through a method known as “stealthy dopant level hardware Trojans” [8]. 
At the physical network layer, it is clear that vulnerabilities are introduced and exploitation can occur at all phases of a product’s life including design, manufacturing, the supply chain, configuration, and usage. This is depicted in Figure 3.
Estimated Overall Risk Assessment:HIGH/MID/LOW
- Technical Impacts: 
- Business Impacts: 
- Detectability: 
- Prevalence: 
- Exploitability: 
Attack Surfaces Grouped By Layer of Cyberspace
- Physical Network Layer- Device Physical Interfaces
- Sensors
 
Known Intrusion / Exploit / Attack Cases and Threats
TBD
Identify, Detect, Protect, Respond, and Recover (NIST FICIC)
TBD
Analysis Tools and Training
TBD
Associated CVEs / Manufacturers / Devices
TBD
References
TBD