Security Vulnerabilities

  1. Hardware and Physical Security Vulnerabilities
    1. Microprocessor Vulnerabilities
      1. Speculative Execution Attacks
        1. Spectre Variants
          1. Meltdown Attack
            1. Foreshadow Attack
              1. MDS Attacks
              2. Cache-Based Side-Channel Attacks
                1. Flush+Reload
                  1. Prime+Probe
                    1. Evict+Time
                    2. Branch Prediction Attacks
                      1. Return Stack Buffer Attacks
                      2. Memory System Vulnerabilities
                        1. Rowhammer Attacks
                          1. Cold Boot Attacks
                            1. Memory Bus Snooping
                              1. DMA Attacks
                              2. Side-Channel Attack Vectors
                                1. Power Analysis Attacks
                                  1. Simple Power Analysis (SPA)
                                    1. Differential Power Analysis (DPA)
                                    2. Timing Attacks
                                      1. Cache Timing Attacks
                                        1. Network Timing Attacks
                                        2. Electromagnetic Emanation Attacks
                                          1. Acoustic Cryptanalysis
                                            1. Optical Side-Channel Attacks
                                            2. Firmware and Boot Process Vulnerabilities
                                              1. BIOS/UEFI Vulnerabilities
                                                1. Secure Boot Bypass
                                                  1. UEFI Rootkits
                                                    1. SMM Vulnerabilities
                                                    2. Bootloader Vulnerabilities
                                                      1. Trusted Platform Module (TPM) Attacks
                                                        1. Hardware Security Module (HSM) Vulnerabilities
                                                        2. Physical Access Vulnerabilities
                                                          1. Device Tampering
                                                            1. Component Replacement
                                                              1. Chip-Off Attacks
                                                                1. JTAG Interface Exploitation
                                                                  1. Serial Console Access
                                                                    1. USB-Based Attacks
                                                                      1. BadUSB Attacks
                                                                        1. USB Rubber Ducky
                                                                          1. USB Killer Devices