Voraussetzungen
Proximal access to the device.
Erforderliche Kenntnisse
Sophisticated attack, but detailed techniques published in the open literature.
Gegenmaßnahmen
Utilize side-channel resistant implementations of all crypto algorithms.
Strong physical security of all devices that contain secret key information. (even when devices are not in use)
Verwandte Schwachstellen
| CWE-ID |
Name der Schwachstelle |
|
Insertion of Sensitive Information Into Sent Data The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. |
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences |