Skip to content

Commit d30c58f

Browse files
committed
Merge branch 'hardware_asset_redesign'
2 parents 5418a01 + 005f510 commit d30c58f

File tree

6 files changed

+285
-186
lines changed

6 files changed

+285
-186
lines changed
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
/*
2+
* Copyright 2019-2021 coreLang contributors <https://mal-lang.org/coreLang/contributors.html>
3+
*
4+
* Licensed under the Apache License, Version 2.0 (the "License");
5+
* you may not use this file except in compliance with the License.
6+
* You may obtain a copy of the License at
7+
*
8+
* https://www.apache.org/licenses/LICENSE-2.0
9+
*
10+
* Unless required by applicable law or agreed to in writing, software
11+
* distributed under the License is distributed on an "AS IS" BASIS,
12+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
* See the License for the specific language governing permissions and
14+
* limitations under the License.
15+
*/
16+
17+
category Vulnerability {
18+
19+
asset HardwareVulnerability extends Vulnerability
20+
user info: "A vulnerability that affects hardware."
21+
{
22+
# confidentialityImpactLimitations @suppress [Disabled]
23+
user info: "Limits the impact on confidentiality of the vulnerability."
24+
modeler info: "Analogous defence to the SoftwareVulnerability impact limitations."
25+
-> read
26+
27+
# availabilityImpactLimitations @suppress [Disabled]
28+
user info: "Limits the impact on availability of the vulnerability."
29+
modeler info: "Analogous defence to the SoftwareVulnerability impact limitations."
30+
-> deny
31+
32+
# integrityImpactLimitations @suppress [Disabled]
33+
user info: "Limits the impact on integrity of the vulnerability."
34+
modeler info: "Analogous defence to the SoftwareVulnerability impact limitations."
35+
-> modify
36+
37+
# effortRequiredToExploit @suppress [Disabled]
38+
user info: "The vulnerability requires additional effort(time) from the attacker in order to be successful."
39+
modeler info: "The expectation is that the attacker has prolonged or recurring access to the targeted hardware in order to repeatedly/continuously attempt the exploit."
40+
-> exploitTrivially
41+
42+
& read
43+
user info: "The attacker can read some or all of the associated hardware's data."
44+
-> hardware.read
45+
46+
& modify
47+
user info: "The attacker can modify some or all of the associated hardware's behaviour."
48+
-> hardware.modify
49+
50+
& deny
51+
user info: "Denial-of-Service attack is an attack in which a machine or hardware component is rendered unavailable to its intended users by temporarily or indefinitely disrupting it."
52+
-> hardware.deny
53+
54+
| attemptExploit @Override
55+
user info: "This is the attack step that must be reached in order for a vulnerability to be able to be exploited. This is also the single checkpoint for all vulnerabilities to model hindrances to employing an exploit."
56+
-> exploitTrivially,
57+
exploitWithEffort
58+
59+
& exploitTrivially
60+
user info: "The exploit is trivial and requires insignificant effort from the attacker in order to be successful."
61+
-> exploit
62+
63+
& exploitWithEffort [Exponential(0.01)]
64+
user info: "The attacker must expend effort in order to successfully exploit the vulnerability."
65+
developer info: "The distribution chosen here may be scientifically sound, but needs to be reevaluated to ensure that this is the case."
66+
-> exploit
67+
68+
| impact
69+
user info: "The actual impact caused by successfully exploiting the vulnerability."
70+
-> read,
71+
modify,
72+
deny
73+
}
74+
75+
}
76+
77+
associations {
78+
HardwareVulnerability [vulnerabilities] * <-- hardwareVulnerability --> 0..1 [hardware] Hardware
79+
developer info: "Every Application can also be connected to any Vulnerability."
80+
}

src/main/mal/SoftwareVulnerability.mal

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ category Vulnerability {
7272

7373
# highComplexityExploitRequired @suppress [Disabled]
7474
user info: "The vulnerability relies on a high complexity exploit that requires the attacker to expend additional effort (time) in order to successfully make use of it."
75-
developer info: "A vulnerability that has high complexity due to its intrisic properties that are beyond the attacker's control."
75+
developer info: "A vulnerability that has high complexity due to its intrinsic properties that are beyond the attacker's control."
7676
modeler info: "https://www.first.org/cvss/v3.1/specification-document#2-1-2-Attack-Complexity-AC"
7777
-> exploitTrivially
7878

@@ -111,7 +111,7 @@ category Vulnerability {
111111
softwareProduct.modifyApplication
112112

113113
& deny
114-
user info: "Denial-of-Service attack is an attack in which a machine or network resource is rendered unavailable to its intended users by temporarily or indefinitely disrupting it."
114+
user info: "Denial-of-Service attack is an attack in which an application is rendered unavailable to its intended users by temporarily or indefinitely disrupting it."
115115
-> application.deny,
116116
softwareProduct.denyApplication
117117

0 commit comments

Comments
 (0)