Common use of Threat Model Clause in Contracts

Threat Model. ▇▇▇▇▇-▇▇▇ (DY) model is employed, which entails an insecure channel communication and an untrustworthy nature between the parties [56]. Thus, the malicious attacker can easily eavesdrop and tamper the exchanged messages. The worst-case scenario, for instance, might involve seizing a drone, that is hovering, and then compromising its data. The prevalent “▇▇▇▇▇▇▇ and ▇▇▇▇▇▇▇▇’▇ adversary model (CK- adversary model)” is, reportedly, the de facto standard for modelling the authenticated key exchange protocols. The CK- adversary model entails that the adversary can also hack the secret credentials, secret keys and the session states. Therefore, it has become an essential requirement that “the leakage of some forms of secret credentials, such as session ephemeral secrets or secret key, should have the minimum possible consequence on the secrecy of other secret credentials of the communicating participants” [58].

Appears in 2 contracts

Sources: Certificate Based Access Control and Key Agreement Scheme, Certificate Based Access Control and Key Agreement Scheme