ID | Name |
---|---|
T2013.001 | Replace / generate new Session Keys |
T2013.002 | Replace / generate new Master Keys |
Adversaries can replace the master key used to encrypt TM/TC in order to gain permanent access to other functionalities, or interrupt the owner's control by generating new ones.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.