| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_fw_update_and_recovery.rst | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| H A D | threat_model_el3_spm.rst | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| H A D | threat_model_arm_cca.rst | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| H A D | index.rst | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| H A D | threat_model.rst | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| /rk3399_ARM-atf/docs/resources/diagrams/ |
| HD | tf-a_data_flow_diagram.png | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| HD | tf-a_system_diagram.png | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| HD | tf-a_attack_tree.png | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| /rk3399_ARM-atf/docs/threat_model/ |
| H A D | supply_chain_threat_model.rst | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|
| H A D | index.rst | b908814c74f5c5d4a9f2b86f341f38a3948527a9 Fri Dec 08 21:00:07 UTC 2023 laurenw-arm <lauren.wehrmeister@arm.com> docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
|