1*54fd6939SJiyong ParkThreat Model 2*54fd6939SJiyong Park============ 3*54fd6939SJiyong Park 4*54fd6939SJiyong ParkThreat modeling is an important part of Secure Development Lifecycle (SDL) 5*54fd6939SJiyong Parkthat helps us identify potential threats and mitigations affecting a system. 6*54fd6939SJiyong Park 7*54fd6939SJiyong ParkIn the next sections, we first give a description of the target of evaluation 8*54fd6939SJiyong Parkusing a data flow diagram. Then we provide a list of threats we have identified 9*54fd6939SJiyong Parkbased on the data flow diagram and potential threat mitigations. 10*54fd6939SJiyong Park 11*54fd6939SJiyong Park.. toctree:: 12*54fd6939SJiyong Park :maxdepth: 1 13*54fd6939SJiyong Park :caption: Contents 14*54fd6939SJiyong Park :numbered: 15*54fd6939SJiyong Park 16*54fd6939SJiyong Park threat_model 17*54fd6939SJiyong Park threat_model_spm 18*54fd6939SJiyong Park 19*54fd6939SJiyong Park-------------- 20*54fd6939SJiyong Park 21*54fd6939SJiyong Park*Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.* 22