-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
draft: a practical example #32
base: main
Are you sure you want to change the base?
Conversation
Reviewed artifacts:
|
Today I tested a couple of existing projects using psm and nix. Build takes quite a long time and to find something that works seems like a lot of effort. |
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as resolved.
This comment was marked as resolved.
This comment was marked as outdated.
This comment was marked as outdated.
Just because I was the one that made the mistake during our conversation, I think I should clarify. CEM contains Evaluation methods (hence the acronym) and not requirement templates. Part 2 and Part 3 contains them. |
Oh, I missed the indent🤯. Its a separate item, not a subitem of CEM. Part 2 and 3 can be found here Details
|
https://www.youtube.com/watch?v=Png3J4dlQ04&list=WL&index=9 CC is a language for specifying security requirements and a methodology for testing them. security, but not functions or performance. Scheme of the certificate, protection profile (set of functional requirements) |
Consider vesting validator. |
EXAMPLE Target of Evaluation |
attack surface of a validator: What can a hacker study to try and get the valuables locked at the validator? |
to Organisational practices: MSFT SQL. An assumption could be: a programmer uses a trusted API to access the plutus script. There was some talking about creating a validator that is a self-contained product: it could be used by different backends.. If a hacker wants cause damage they would build a transaction to steal funds from a validator. So our level of analysis at this point is transaction building, I think. Threats exist at multiple levels. But what about the Redeemer and transaction context? |
Could an assumption be: the developer uses a trusted API for building transactions? |
An error a programmer could make is to add private information to the Datum. A Datum is public, it offers no cryptographic protection, and can't be used to store secrets. So a threat would be "a developer can store private information in the Datum" An assumption we have is that the user follows safe practices for managing secrets: does not lose his private key. |
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a few comments :)
context for the evaluated TOE by identifying the TOE type, describing the product, and defining the | ||
specific evaluated configuration. <br> | ||
|
||
1.5.X TODO: Usage and features, Type, Non-TOE hardware/firmware/software required by the TOE |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's an interesting discussion here. I don't think we need to worry about hardware/firmware in our industry because we basically eliminate hardware errors by having the computation distributed and checked across the nodes (which also means we have no idea which hardware will run the computation).
That being said, there could be a discussion if, for example, an attacker could access the HW where a private key is stored or if the HW where the key is stored is vulnerable to some attack to extract the private key.
But do we want to consider that in our ST?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Indeed.
This reminds me of security objectives:
Consider which is the project that is related to this ST? Adderall | Stellar-Vesting. TODO |
It's usually the other way around. You define a ST from an existing product. But as an exercise this could be fine as well. |
Ah. Well, they are both vesting in Helios, but stellar vesting is built on a framework that implements UUT, "thread token" architecture. The goal of aderall is to give a developer a mental model of eUTXO in code: to empower the developer to experiment with transaction building, dApp architecture and dApp models to understand how to architect a Web3 product. Helios allows writing both validators and transactions (via blockfrost): the architecture need not contain the node. So a goal of an audit would be to answer the question "can it be used on mainnet?" |
list the deliverables from: