# Threat Model
Threat modeling is a systematic approach to find potential threats by decomposing and enumerating system components. There are many different methodologies and/or frameworks when conducting threat modeling, such as STRIDE, DREAD, Attack Tree, etc. In our case, our Thread Model is based on STRIDE and Attack Tree.
STRIDE provides a set of security threats in five categories (the last one is ignored):
- Spoofing - impersonating the identity of another
- Tampering - data is changed by an attacker
- Repudiation - an attacker refuses to confirm an action was conducted
- Information Disclosure - exposing sensitive information
- Denial of Service - degrade the availability or performance of the system
- Elevation of Privilege (not applicable in our case)
For each category, we enumerate all the potential threats by breaking down a high-level goal into more specific sub-goals, in a way similar to attack tree enumeration. And in each sub-goal, we set the risk level by combining the Severity
and Exploitability
of the item.
# Severity
5
: Severe impact on the whole system4
: High impact on the whole system3
: Moderate impact on the whole system or Severe impact on individual user/node2
: High impact on individual user/node1
: Moderate impact on individual user/node
# Exploitability
5
: Existing exploit code available4
: Relatively easy to exploit3
: Attack is practical but not easy, a successful attack may require some special conditions2
: Theoretically possible, but difficult in practice1
: Very difficult to exploit0.1
: Almost impossible
# Assets
- The integrity of the account balance: the most important piece of information in the blockchain.
- Validator secret keys: one of the most powerful key, lost 1/3 of these keys will render the whole system to an unstable state.
- User secret keys: key owner implies fund owner
- Transaction encryption keys: transaction privacy of the system relies on the secrecy of this key
# Scope
The whole Crypto.com Chain is a complex system and involves many different components. And therefore, the scope of this threat model is limited only to the major components of the system. To be more specific, the threat modeling of Tendermint and Intel SGX is NOT in the scope of this threat modeling.
We also assume standard security measures like OS level hardening, software patching, anti-virus, network firewall, physical security, etc, are properly implemented, executed and monitored. These mitigation strategies are not mentioned here.