Skip to content
9 · Threat Model

Threat Model

Andi Lamprecht Andi Lamprecht ·· 12 min read· Draft
Consolidated threat reference. This page is the canonical home for the full threat model. Per-page threat tables (e.g., Flight Lifecycle §4 and Trust Model §6) are scoped to their domain; this page consolidates them and adds the cross-cutting threats.

1. Threat Categories

ATOMx addresses ten categories of threat. The first six are the primary attack surfaces; the last four are systemic threats that span the platform.

#CategoryPrimary Concern
1Identity threatsSpoofing, impersonation, fabricated credentials
2Replay threatsReuse of valid material outside its intended window
3Disclosure threatsPublic exposure of pilot, operator, or station data
4Time threatsManipulation of clocks to extend or backdate validity
5Key-abuse threatsMisuse of legitimately-issued credentials
6Sensor threatsHonest signing of falsified sensor data (GPS spoofing, jamming)
7SoC and supply-chain threatsCompromise below the TPM line of sight
8Availability threatsDoS, RF jamming, partition isolation
9OEM and platform-insider threatsMalicious or compromised actors with legitimate authority
10Operational and regulatory-evasion threatsCooperative actors gaming the system

1.1 Framework alignment

The taxonomy is informally aligned to STRIDE for traditional security threats (spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege) and to LINDDUN for privacy-specific threats (linkability, identifiability, non-repudiation-as-a-privacy-cost, detectability, disclosure of information, content unawareness, policy/consent violation). MITRE ATT&CK is consulted for tactic/technique mapping where it applies; ATOMx does not adopt ATT&CK as the primary structure because the airspace-trust threat surface is not well covered by enterprise/ICS matrices alone.

2. Identity Threats

ThreatDescriptionMitigation
Pilot identity spoofingFalse identity claimed at authorizationlogin.gov identity proofing + IACRA FTN verification; PIV / CAC where strong non-repudiation is required (Pilot Identity §4)
Drone identity spoofingFalse aircraft claims valid identityTPM attestation challenge at onboarding; dual-chain cross-reference of EK and Drone Assembly Certificate (Aircraft Hardware Identity §2)
Firmware / bootloader tamperingCompromised software running on a genuine dronePCR Quote at onboarding compared against baseline (Aircraft Hardware Identity §4)
Hardware key extractionPrivate key removed from the secure elementTPM design — keys never leave the chip; physical-tampering response wipes the chip
Stolen field deviceManaged verifier device is compromisedDevice credential revocation; local secure storage; short-lived person-bound credentials (Onboarding Authorities §2)

3. Replay Threats

ThreatDescriptionMitigation
Cross-session replayTelemetry packet reused on a different flightflight_auth_id in every packet differs per session (Flight Lifecycle §3)
Intra-session replay / reorderingOld packet replayed within the same sessionStrictly incrementing seq number; server tracks last seen
Token replayOld Public Aircraft Token reusedShort validity, nonce, replay detection, duplicate token detection
Capsule replayCapsule used outside its validity windowEach capsule carries a unique nonce; field devices remember recently-seen nonces and reject duplicates locally; ATOMx detects them globally during reconciliation
Endorsement transplantEndorsement from one flight applied to anotherAuthority signature covers the base token fields, binding the endorsement to a specific request (Authorization Package §3)

4. Disclosure Threats

ThreatDescriptionMitigation
Public trackingPublic uses aircraft ID to track aircraft across missionsAuthorization-bound rotating Public Aircraft Token (Authorization Package §5)
Pilot doxxingPublic receives pilot / operator or control-station locationProtected fields envelope-encrypted; not in public broadcast or COP (Authorization Package §6)
Unauthorized disclosureProtected fields accessed without valid needDisclosure Policy Engine; field-level release; logging; purpose codes
Federation leakCross-agency federation exposes more than intendedSlack-Connect model: opt-in selective sharing per peer (Onboarding Authorities §4)

5. Time Threats

The general principle: time is a credential, and the system does not trust any single time source. Aircraft and field devices each independently track their last trusted ATOMx time anchor in tamper-resistant hardware, and degrade gracefully when their confidence in current time is low. Full treatment in Disconnected Operations §5.4.

ThreatMitigation
Aircraft clock rolled forward / back to reuse an expired or future capsuleSecure element stores a monotonic counter plus the last signed time anchor received from ATOMx; capsule validity is checked against max(SE-time-anchor, GNSS-time)
GNSS time spoofingAircraft cross-checks GNSS time against secure-element monotonic counter; sudden jumps flag the aircraft into a “time-degraded” state which is broadcast
Verifier device clock manipulationField device’s secure enclave records its own monotonic time; verification logic uses enclave time, not OS clock
Long offline windows where every clock has driftedCapsule validity windows for time-bounded and blanket authorizations sized with explicit slack; “time-degraded but otherwise valid” reported as a distinct state

6. Key-Abuse Threats

ThreatDescriptionMitigation
Insider misuseAuthorized user accesses sensitive fields improperlyDisclosure logging, purpose codes, after-action review
Offline key abuseField credentials decrypt outside scopePerson / device / geography / purpose constraints; reconciliation flags out-of-scope decryption
Authority key compromiseATOMx-held authority signing key misusedHSM custody; signing-event audit log; key rotation; revocation of issued endorsements as needed (Authorization Package §4)
Break-glass abuseField verifier overuses break-glass to bypass scopeBreak-glass disclosures flagged in reconciliation; clusters trigger after-action review (Disconnected Operations §6.5)

7. Sensor Threats — The Residual Risk

GPS spoofing is the residual risk that cryptography alone cannot solve. A drone with a hardware-bound key and attested firmware will honestly sign whatever its GPS sensor reports. Full mitigation requires independent position corroboration — cellular triangulation, ground radar, or ADS-B — which is an infrastructure problem, not a cryptography problem.

ATOMx surfaces this as a telemetry-confidence axis in the Authorized Operational State, not as a binary. A flight whose reported position diverges from corroborating sources keeps its trust level (the cryptographic chain is intact) but its confidence is downgraded and a security alert is raised.

8. SoC and Supply-Chain Threats

PCR attestation proves the integrity of the software stack but not the SoC itself. Hardware backdoors in silicon, or compromised radio chips, are invisible to TPM attestation. These are addressed through:

ThreatMitigation
Hardware backdoor in SoC, radio, or peripheral chipPlatform certificates issued by the OEM at assembly, asserting the bill of materials; NDAA / Section 889 compliance for US government customers; Blue UAS / Trusted Component listing where applicable
Counterfeit TPM chip with valid-looking EKCross-reference of EK Certificate against TPM manufacturer’s published serial registry; periodic spot-attestation and PCR profile drift detection
Pre-fabrication supply-chain compromise (malicious silicon insertion)Trusted-foundry programs; formal hardware verification; incoming-inspection regime — out of scope for ATOMx software, in scope for OEM eligibility review (Onboarding Manufacturers §2)
Drone capture / physical forensics post-landingTamper-response circuits in TPM; on-detection key zeroization; encrypted at-rest storage of flight logs
Decapping / side-channel key extractionTPM physical-tamper resistance ratings (FIPS 140-3 Level 3+); short-lived session keys derived under EK so a long-term extraction yields limited blast radius

This is the gap to surface to certification reviewers: TPM attestation is a strong claim about software state and a weaker claim about hardware composition. See Aircraft Hardware Identity §5.

9. Availability Threats

Cryptographic guarantees are worthless if the platform is unreachable when the trust answer is needed.

ThreatMitigation
Volumetric DoS against the Authorization ServiceEdge rate-limiting; per-operator quotas; horizontal scaling of stateless services; circuit-breakers on dependent services
DoS against the Disclosure Policy Engine during incidentsPre-warmed capacity for known event windows (NSSEs, large airshows); priority queuing for authority requests; degraded-mode read replicas
RF jamming of C2, telemetry, or Remote ID broadcastAircraft enters time-degraded state and broadcasts the flag; ATOMx falls back to corroborating sources; authority verifiers downgrade confidence
Wholesale GNSS jamming over a regionAircraft cross-checks GNSS time against secure-element monotonic counter; operations may be mass-curtailed by authority via amendment; fixed reference receivers used for ground-truth where deployed
Network partition isolating an operator from ATOMxPre-cleared offline capsule covers planned operations; spontaneous-flight gap noted as open question (Origins §9)
Audit-ledger storage exhaustionTiered retention with cryptographic anchors; aged events archived to immutable cold storage with retained hash chain

10. OEM and Platform-Insider Threats

Threats from actors with legitimate authority but malicious intent. These are the hardest threats to defend against and rely on procedural controls layered over technical ones.

ThreatMitigation
Malicious OEM signs a Drone Assembly Certificate for a backdoored unitOEM eligibility review with re-certification cadence; batch-attestation reconciliation against expected production volume; field-evidence anomaly detection against the signed batch records
OEM HSM compromise (private key extraction)Per-OEM CA segregation — compromise of one OEM does not affect others; rapid revocation of the OEM intermediate; recovery requires re-signing all in-field aircraft (significant operational cost, hence the OEM HSM is a hard gate)
Compromised auditor / certification body falsely passes an OEMMulti-auditor diversity; ATOMx-side independent technical-conformance verification; whistleblower channel; no auditor’s pass alone unlocks production minting
ATOMx insider with HSM access misuses Root or intermediate keysDual-control / m-of-n quorum on Root ceremonies; signing-event audit log replicated to a tamper-evident ledger; HSM keys never leave the appliance; rotational privilege; periodic external audit
Audit-ledger tampering by an ATOMx insider (delete or alter events)Append-only ledger with hash-chained entries; off-site replication to FedRAMP-aligned cold storage; periodic third-party audit; signed merkle anchors published to authority partners
Authority key compromiseATOMx-held authority signing key segregated per authority; HSM custody; rapid revocation of issued endorsements; cross-authority detection if signing volume anomalously spikes
Social engineering of field verifiers (impersonation, coerced break-glass)Three-factor binding (person + device + purpose); break-glass requires explicit confirmation and free-text justification; clusters trigger after-action review; manager-approval requirement for sensitive purpose codes

11. Operational and Regulatory-Evasion Threats

Cooperative-on-paper actors gaming the system to obtain authorizations they should not have, or to operate outside their authorization.

ThreatMitigation
Operator splits one large operation into many small flights to stay under thresholdsCumulative-effect detection; per-operator analytic baselines; authority discretion to require aggregate filing
False purpose code claimed at field-verification disclosurePurpose-code use is logged; pattern detection across an authority; FOIA / discovery exposure as a practical deterrent
Operator declares lower-risk mission class than actualConformance evaluation against telemetry catches the divergence in flight; corroborating sources flag anomaly
Authority over-issues endorsements (“rubber-stamp”)Signing-volume metrics per endorser visible to that authority’s leadership; sampled audit of endorsements against operation type
Linkability across rotating Public Aircraft Tokens via traffic analysisToken rotation policy varies entropy; common waypoints / departure points may still leak — flagged as a residual privacy risk (§13)

12. Disclosure Lifecycle Threats

Beyond the disclosure threats already in §4, there are lifecycle threats specific to the aftermath of a legitimate disclosure.

ThreatMitigation
Authorized recipient redistributes disclosed PIIDisclosure receipt embeds usage terms; legal terms in authority MOU; downstream sharing logged where possible
Disclosed identity persists in authority systems beyond purposeDisclosure receipts carry retention tags; periodic purge audits
FOIA / discovery request for disclosure logsLog structure designed to support redaction without breaking integrity; authority counsel reviewed before the policy is set

13. Residual Risks (Accepted)

These risks have no full mitigation today and are accepted with monitoring. Each is documented to set reviewer expectations and to drive future work.

RiskWhy AcceptedCompensating Control
GPS spoofing with corroborating-sensor compromiseCryptography signs honest sensor readings; sensor-fusion is an infrastructure problemTelemetry-confidence axis; cross-corroboration with ADS-B / radar where available
Truly disconnected first flight (no prior connectivity)Pre-cleared capsule model assumes one online window before flightSurface as “Not Publicly Verifiable”; reconciliation later. See Origins §9
SoC-level silicon backdoorOut of scope for software cryptographic mitigationNDAA / supply-chain attestation; trusted-foundry programs
Token-rotation linkability via traffic analysisOperational metadata (waypoints, schedules) leaks even with rotated tokensStricter rotation for protected missions; future research on geometry generalization
Wholesale GNSS jammingAdversary capability outside ATOMx controlTime-degraded state propagation; fixed reference receivers in critical airspace

14. Cross-References

Implementation Readiness — Open Questions

Each entry below identifies a decision not yet locked. Items marked (ADR) should be formalized as an Architecture Decision Record before implementation begins. Items marked (blocking) must be resolved before the relevant feature can be built.

#QuestionOwnerADR?Blocking?
1Residual-risk register: who signs off on each accepted risk (§13), and what is the re-review cadence? Need named accepted-by signatures (CTO, CISO, product lead) and an annual review schedule.Security + ProductYes — “Residual Risk Governance & Acceptance Process”Yes
2DoS-protection capacity targets: what RPS / concurrent-verifier volumes must the public verification surface sustain before degradation, and what is the auto-throttle policy?EngineeringYes — “Verification Surface Capacity & Rate-Limit Policy”Yes
3Drone-capture forensics: what is the legal framework for chain-of-custody, evidence handling, and cross-jurisdiction handoff once a captured aircraft yields data?Legal + SecurityNo (policy doc)No
4Malicious-OEM detection thresholds: what statistical / behavioral signals trigger an OEM-attestation review, and at what confidence level do we revoke a manufacturer trust anchor?Security + EngineeringYes — “OEM Trust Anchor Revocation Criteria”Yes
5Audit-ledger tampering detection: transparency log (Trillian / Sigstore-style), Merkle-witness mesh, or notarized blockchain anchor? Decision drives the entire integrity story for §11.EngineeringYes — “Audit Ledger Integrity Mechanism”Yes
6m-of-n quorum for ATOMx insider control: what are the n and m values, who holds the shares (role separation), and what is the key-ceremony / rotation procedure?SecurityYes — “Insider-Threat Quorum Topology”Yes
7Social-engineering training program for field verifiers (LEO, FAA, public): owner, curriculum, refresh cadence, and effectiveness measurement.Product + External (authority partners)NoNo
8Traffic-analysis privacy mitigation (§13 residual): is mixnet-style padding, k-anonymous geometry generalization, or differential-privacy geometry-bucketing the path forward?Engineering (research)Yes — “Token-Rotation Linkability Mitigation Strategy”No
9Formal threat-modeling tool selection: OWASP Threat Dragon, Microsoft TMT, or IriusRisk for ongoing diagram-driven modeling. Affects tooling spend and onboarding.SecurityYes — “Threat Modeling Tool & Workflow”No
10Pen-test cadence + vulnerability disclosure / bug bounty program: internal red team only, third-party annual, continuous bug bounty (HackerOne / Bugcrowd)? Who triages?Security + ExternalYes — “Security Testing & Disclosure Program”No
11Security incident response runbook ownership: who owns the on-call rotation, what is the SLA for authority-impacting incidents, and where do runbooks live?Security + EngineeringNo (runbook)Yes
12Regulatory-evasion detection: ML-anomaly model, deterministic heuristic rules, or hybrid? Drives data pipeline, label set, and false-positive tolerance.Engineering + ProductYes — “Regulatory-Evasion Detection Approach”No
Last updated on