Home
last modified time | relevance | path

Searched hist:b908814c74f5c5d4a9f2b86f341f38a3948527a9 (Results 1 – 10 of 10) sorted by relevance

/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dthreat_model_fw_update_and_recovery.rstb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
H A Dthreat_model_el3_spm.rstb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
H A Dthreat_model_arm_cca.rstb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
H A Dindex.rstb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
H A Dthreat_model.rstb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
/rk3399_ARM-atf/docs/resources/diagrams/
HDtf-a_data_flow_diagram.pngb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
HDtf-a_system_diagram.pngb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
HDtf-a_attack_tree.pngb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
/rk3399_ARM-atf/docs/threat_model/
H A Dsupply_chain_threat_model.rstb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
H A Dindex.rstb908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>