From 3126a9c51ed1b4a320ad14da005490dec80cee08 Mon Sep 17 00:00:00 2001 From: Michael Cardell Widerkrantz Date: Thu, 13 Feb 2025 13:44:25 +0100 Subject: [PATCH] doc: Revise threat model for spelling - Spell out Chaos Communication Congress. - Correct spealling of weaknesses. --- doc/threat_model/threat_model.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/doc/threat_model/threat_model.md b/doc/threat_model/threat_model.md index 3a37a2d..c67231e 100644 --- a/doc/threat_model/threat_model.md +++ b/doc/threat_model/threat_model.md @@ -115,8 +115,8 @@ allowed * Access to compute resources. Possibly access to lab equipment * Will try all possible SW and HW attack vectors. In and out of scope * End game is to find flaws in threat model. Acquire knowledge and - findings to produce an interesting talk at CCC, USENIX or Security - Fest + findings to produce an interesting talk at Chaos Communication + Congress, USENIX or Security Fest Over time (with new releases), and given feedback by the CCC Hacker, the TKey device should be able to withstand attacks by the CCC Hacker. @@ -258,7 +258,7 @@ information, see the [Release Notes](/doc/release_notes.md) Note that this mitigates an attack from outside the CPU, not from an exploit towards applications running on it. -#### Known possible weakneses +#### Known possible weaknesses The CH552 MCU providing USB host communication contains firmware that implements the UART communication with the FPGA. The CH552 firmware @@ -297,7 +297,7 @@ board, and is even shipped with a programmer to download new FPGA bitstreams. -#### Known weakneses +#### Known weaknesses The bitstream, which includes the Unique Device Secret (UDS) as well as the firmware implementing the measured boot are stored as part of