Skip to main content

Week 1 — Threat Modeling for IoT Devices

Security failures in IoT rarely happen because encryption was weak. They happen because the system was not designed with threats in mind.

This week builds the foundation.


1. What is Threat Modeling?

Threat modeling is the process of:

  • Identifying assets
  • Defining attack surfaces
  • Understanding who the attacker is
  • Anticipating how the system can be abused

2. Typical IoT Assets

AssetWhy it matters
FirmwareCan be reverse-engineered or modified
Encryption keysLead to full device compromise
OTA mechanismUsed to push malicious firmware
Cloud credentialsCan compromise entire fleet

3. Trust Boundaries in IoT

A typical IoT system has multiple trust zones:

  • Device firmware
  • Bootloader
  • External flash
  • Network communication
  • Cloud backend

Any boundary crossing is a potential attack point.


4. Common IoT Attack Vectors

  • Physical access (UART, JTAG, SWD)
  • Firmware extraction
  • Replay attacks
  • Man-in-the-middle OTA updates
  • Cloud credential leakage

5. STRIDE Model (Simplified)

ThreatExample
SpoofingFake cloud server
TamperingModified firmware
RepudiationNo audit trail
Information DisclosureKey leakage
Denial of ServiceOTA brick
Elevation of PrivilegeBootloader bypass

Week 1 Assignment

  1. Draw a block diagram of an IoT device you’ve worked on.
  2. Identify:
    • Assets
    • Trust boundaries
    • At least 5 realistic threats