PhoenixSig Threat Model

A transparent analysis of what PhoenixSig protects against, what it assumes, and where its boundaries lie. Security through clarity, not obscurity.

1. Adversary Model

PhoenixSig is designed to resist the following adversary classes, ordered by increasing capability:

Adversary ClassCapabilitiesPhoenixSig Response
Remote Software AttackerRCE on application processor, RAM access, file system read/writeFull PCS recovery after Phoenix refresh
Insider ThreatAuthorized access to device, may extract application-level secretsVaultKey in TEE — non-exportable, insider cannot extract
Supply Chain AttackerMay compromise firmware, inject backdoors in software updatesTEE attestation detects tampered firmware; quarantine mode activated
Quantum Adversary (Future)Access to cryptographically relevant quantum computerML-DSA/SLH-DSA backends — NIST PQC standards
Physical Device CaptureFull hardware access, TEE probing, side-channel attacksPartially mitigated — see Section 5

2. Attack Surfaces

2.1 Application Layer

The primary attack surface. An adversary with remote code execution can read the current state (sigma, epoch, counter) from memory. PhoenixSig's response: Even with full state capture, the attacker cannot forge future signatures after a Phoenix refresh, because VaultKey is isolated in the TEE and cannot be read from the application processor.

2.2 State Rollback

An attacker may attempt to restore a previous device state to reuse old signing keys. PhoenixSig's response: Monotonic epoch and counter enforcement. Verifiers reject signatures from stale epochs. Hardware-backed counters (where available) prevent OS-level rollback.

2.3 RNG Manipulation

Compromised or weak random number generators could make key derivation predictable. PhoenixSig's response: DyLWE core is deterministic — it does not depend on OS RNG. Entropy comes exclusively from VaultKey (TEE-anchored) and the current state, both of which are outside attacker control.

2.4 Side-Channel Attacks

Timing, power analysis, or electromagnetic emanation attacks against the signing operation. PhoenixSig's response: Delegated to the PQC implementation (ML-DSA/SLH-DSA) which must use constant-time implementations. TEE execution provides an additional isolation boundary.

2.5 Merkle Tree Manipulation

An attacker may attempt to forge Merkle authentication paths. PhoenixSig's response: The Merkle root (RootPK) is published and committed at enrollment time. Forging a valid path requires finding a preimage of the hash function — computationally infeasible under standard assumptions.


3. Security Assumptions

Assumptions That Must Hold

PhoenixSig's PCS guarantee depends on the following assumptions. If any assumption is violated, the specific guarantee it supports may be weakened.

AssumptionSupportsIf Violated
TEE isolates VaultKey correctlyPCSPCS degrades to forward security only
HKDF behaves as random oracleAll propertiesState evolution becomes predictable
Module-LWR is computationally hardForward securityPast states may be recoverable
ML-DSA/SLH-DSA is unforgeableSignature validitySignatures can be forged regardless of PCS
Attacker access is temporaryPCS recoveryPersistent access = persistent compromise

4. PCS Boundary Conditions

4.1 The Compromise Window

Between the moment of compromise (t₁) and the first Phoenix refresh (t₂), the attacker can forge signatures. This window is the fundamental limitation of PCS — the system cannot retroactively invalidate the compromise, only ensure recovery after refresh.

Minimizing this window is an operational concern: automatic periodic refresh, anomaly-triggered refresh, and quarantine-on-reboot all reduce the exposure period.

4.2 What PCS Cannot Do

  • Prevent the initial compromise itself
  • Retroactively invalidate signatures issued during the compromise window
  • Protect against persistent, ongoing TEE compromise
  • Replace physical security for high-value hardware

5. Residual Risks

These risks remain after all PhoenixSig mitigations are applied:

RiskSeverityMitigation Strategy
TEE hardware vulnerability (e.g., Spectre-class)HighMonitor TEE vendor advisories; firmware update policy
Compromise window forgeryMediumMinimize refresh interval; anomaly detection
Merkle tree exhaustionLowTree re-enrollment protocol; capacity planning
Implementation bugsMediumThird-party audit; open-source core components

Security questions?

We welcome security review and responsible disclosure. Reach out to discuss PhoenixSig's security properties.

Security Policy → Contact Us →