arm-trusted-firmware/docs/threat_model
Sandrine Bailleux 348446ad2a docs(threat-model): cover threats inherent to receiving data over UART
TF-A supports reading input data from UART interfaces. This opens up
an attack vector for arbitrary data to be injected into TF-A, which is
not covered in the threat model right now.

Fill this gap by:

 - Updating the data flow diagrams. Data may flow from the UART into
   TF-A (and not only the other way around).

 - Documenting the threats inherent to reading untrusted data from a
   UART.

Change-Id: I508da5d2f7ad5d20717b958d76ab9337c5eca50f
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
2023-11-13 10:28:24 +01:00
..
index.rst docs(threat-model): refresh top-level page 2023-04-04 16:08:05 +02:00
threat_model.rst docs(threat-model): cover threats inherent to receiving data over UART 2023-11-13 10:28:24 +01:00
threat_model_el3_spm.rst fix(docs): replace deprecated urls under tfa/docs 2023-09-07 16:29:11 -05:00
threat_model_fvp_r.rst docs(threat-model): cover threats inherent to receiving data over UART 2023-11-13 10:28:24 +01:00
threat_model_rss_interface.rst docs: add threat model for AP-RSS interface 2022-12-09 10:15:09 +01:00
threat_model_spm.rst fix(docs): replace deprecated urls under tfa/docs 2023-09-07 16:29:11 -05:00