<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-paka-rats-hardware-component-attestation-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="HW-attest">Attestation of Hardware Components</title>
    <seriesInfo name="Internet-Draft" value="draft-paka-rats-hardware-component-attestation-00"/>
    <author initials="A." surname="Poulain" fullname="Antoine Poulain">
      <organization>Secure-IC</organization>
      <address>
        <email>antoine.poulain@secure-ic.com</email>
      </address>
    </author>
    <author initials="A." surname="Kaci" fullname="Abdellah Kaci">
      <organization>Secure-IC</organization>
      <address>
        <email>abdellah.kaci@secure-ic.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="31"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>attestation</keyword>
    <keyword>hardware</keyword>
    <keyword>root of trust</keyword>
    <abstract>
      <?line 80?>

<t>Hardware components constitute the foundation of all computations and therefore play a critical role in system integrity and reliability. Existing attestation mechanisms primarily rely on manufacturer endorsements, which provide limited visibility into the runtime behavior of hardware. This document extends the Remote ATtestation procedureS (RATS) architecture by defining a data model and guidelines for including measurements of hardware components in attestation Evidence. These measurements may represent physical properties, results of self-tests, or behavioral observations. The document considers a threat model that includes both adversarial actions and physical phenomena such as environmental variations and aging. It proposes abstract interfaces for collecting measurements, enabling interoperability while remaining agnostic to implementation mechanisms, and outlines a security model for their use in appraisal.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/antoinepoulain/hardware-component-attestation/blob/main/draft-paka-rats-hardware-component-attestation.txt"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-paka-rats-hardware-component-attestation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/antoinepoulain/hardware-component-attestation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Hardware components form the foundation upon which all computations rely. Therefore, the correctness and integrity of software execution depend on the proper functioning of the underlying hardware, which can be considered a root of trust for computation.</t>
      <t>Modern systems increasingly adopt disaggregated architectures, such as chiplet-based designs and large-scale heterogeneous platforms. These systems integrate hardware components from multiple sources, introducing new attack surfaces.</t>
      <t>At the same time, zero trust principles encourage reducing reliance on static trust anchors and Endorsements in favor of Evidence reflecting the actual runtime state of components, consequently enabling more dependable assessment of both security and safety properties. However, current attestation mechanisms for hardware components primarily rely on manufacturer-issued Endorsements, which capture properties established prior to deployment but provide limited visibility into runtime hardware behavior.</t>
      <t>This document considers a threat model in which hardware components may be affected not only by adversarial actions, but also by physical phenomena such as environmental variations, aging, and natural degradation (see <xref target="seccons"/>). This wider scope is motivated by the fact that hardware components, are directly influenced by physical conditions that can alter their behavior over time or under stress. Therefore, assessing the runtime state of hardware requires taking into account both intentional attacks and non-adversarial effects that may lead to faults or degraded operation. These aspects are particularly important in systems with strong safety and reliability requirements.</t>
      <t>To address these limitations, this document defines a data model and provides guidelines for including hardware component measurements in attestation Evidence (<xref target="evidence"/>), as described in the RATS architecture <xref target="RFC9334"/>. By incorporating runtime hardware measurements, attestation can provide improved visibility into the integrity and reliability of systems. This document also outlines a security model for such measurements and provides examples of existing technologies that can be leveraged to obtain them (<xref target="practical-examples"/>). These examples are informational only and do not mandate specific implementations. Instead, this document remains agnostic to the underlying measurement mechanisms and focuses on defining abstract interfaces (<xref target="abstract-representation"/>) and a data model for obtaining and representing such measurements.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="definitions">
        <name>Definitions</name>
        <t>The terminology defined in <xref target="RFC9334"/> is reused throughout this document. Some definitions from RATS specifications are refined here to fit the context presented in this document.</t>
        <ul spacing="normal">
          <li>
            <t>Measurement Unit: A hardware mechanism (a circuit) or software logic with the ability to measure a hardware component. Software logic used to trigger a measurement is not considered a Measurement Unit but rather the Attesting Environment end-point of the Trigger interface. See <xref target="abstract-representation"/> for details on the Trigger interface.</t>
          </li>
          <li>
            <t>Measurement: Term introduced by RATS. In the context of this document, it can mean a representation of a physical property, the result of a test, the detection of an event, etc.</t>
          </li>
          <li>
            <t>Target Hardware Component: A hardware component which is a Target Environment for an Attesting Environment.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>The solution presented in this document aims at mitigating two threats on hardware.</t>
      <ul spacing="normal">
        <li>
          <t>Defective hardware components</t>
        </li>
      </ul>
      <t>Malfunctions of hardware components may be caused by environment and/or aging. Detection of such malfunctions is critical when relying on systems evolving in hazardous environments such as high pressure, extreme temperatures, contact with water, chemical substances or space radiations.</t>
      <ul spacing="normal">
        <li>
          <t>Attacks on hardware components</t>
        </li>
      </ul>
      <t>Gaining control of the hardware of a system is particularly interesting for an attacker as it allows to tamper with the correct functioning of the system at a privileged level. Such control can be obtained by abusing software mechanisms or by having physical access to the system (particularly relevant for embedded systems) and using physical attack techniques.</t>
      <t>Security and Safety note: Undetected hardware defects can compromise the integrity of cryptographic operations, attestation chains, or safety-critical controls, turning a physical fault into a security vulnerability or a life-threatening failure. In adversarial contexts, hardware degradation may also be leveraged to bypass attestation mechanisms or force a system into an exploitable state. Timely and verifiable detection of hardware component malfunctions is therefore critical for maintaining both operational safety and the trustworthiness of any attestation claim issued by a system.</t>
      <t>For instance, environmental conditions and aging can alter the physical noise source of a TRNG, potentially reducing entropy and compromising the unpredictability required for security and safety. This TRNG example is extended in <xref target="ex-self-test"/>.</t>
    </section>
    <section anchor="attester-model">
      <name>Attester Model</name>
      <t>The RATS architecture presented in <xref target="RFC9334"/> introduces two types of environments in an Attester. The Attesting Environment (AE) and the Target Environment (TE). The Attesting Environment is in charge of collecting claims about a Target Environment. The Attesting Environment is then responsible for embedding those claims in an Evidence Conceptual Message.</t>
      <t>This document focuses on claims used to represent the state of a target hardware component. Said claims can be related to physical properties (electromagnetic or thermal signature, timing values, power consumption, etc.), results of integrated self-tests or collected traces.</t>
      <t>The goal of this section is to propose standard interfaces to trigger the computation of the measurement and to collect the computed measurement. Also, this section presents a mapping of Attesting Environments and Target Environments in different integration models of measurement mechanisms.</t>
      <section anchor="abstract-representation">
        <name>Abstract Representation</name>
        <t>Mechanisms for collecting measurements of hardware components may highly depend of the type of hardware component and on the desired type of measurement. Therefore, this document proposes an abstract representation of such mechanisms. Considering a measurement mechanism as a black box with common interfaces, allows the content of this document to remain agnostic of the underlying mechanism and of the type of measurement collected while promoting interoperability with different real world implementations.</t>
        <t>This document uses the following abstract objects:</t>
        <ul spacing="normal">
          <li>
            <t>Measurement Unit</t>
          </li>
        </ul>
        <t>Black box used to represent a mechanism capable of computing measurements over a target. The Measurement Unit is part of the Attesting Environment.</t>
        <ul spacing="normal">
          <li>
            <t>Trigger interface</t>
          </li>
        </ul>
        <t>To start the computation of a measurement, the Measurement Unit must be triggered. The trigger can follow an external request, a watchdog or any event set to trigger a measurement. The Measurement Unit receives a signal to start the computation of a measurement through the "Trigger" interface.</t>
        <t>This interface is optional. For instance, it may not be used in case of continuous monitoring.</t>
        <ul spacing="normal">
          <li>
            <t>Export interface</t>
          </li>
        </ul>
        <t>The "Export" interface allows a measurement to be exported from the Measurement Unit to a controlled memory region in the trust boundary of the Attesting Environment.</t>
        <ul spacing="normal">
          <li>
            <t>Data Exchange channel</t>
          </li>
        </ul>
        <t>The measurement mechanism needs to have physical access on the property that it is in charge of measuring. The flow of data exchanged between the Measurement Unit and the target hardware component is represented by the "Data Exchange" channel. This channel is not accessible by the Attesting Environment excepted by the Measurement Unit.</t>
      </section>
      <section anchor="integration-models">
        <name>Integration Models</name>
        <t>The following subsections present possible layouts for integrating a Measurement Unit between the Attesting Environment and the target hardware component.</t>
        <section anchor="embedded-mu">
          <name>Embedded Measurement Unit</name>
          <t>In this integration model, the Measurement Unit is part of the target hardware component. The separation between Measurement Unit (part of the Attesting Environment) and the Target Environment is only logical. The target hardware component and the Measurement Unit are part of the same die. Due to the proximity between the Measurement Unit and the target hardware component, the Data Exchange channel is not represented.</t>
          <figure anchor="embed_meas_unit">
            <name>Abstract Representation of Embedded Measurement Unit</name>
            <artwork align="center"><![CDATA[
                              +-------------------------+
+-------------+    Trigger    |    +---------------+    |
|             |  Measurement  |    |               |    |
|             +--------------->    |   Target HW   |    |
|  Attesting  |               |    |   Component   |    |
| Environment |               |    |      (TE)     |    |
|             |               |    +---------------+    |
|             <---------------+     Measurement Unit    |
+-------------+    Export     |           (AE)          |
                 Measurement  +-------------------------+
]]></artwork>
          </figure>
          <t>Ex: Different types of Built-In-Self-Tests (BIST) or Known Answer Tests (KAT).</t>
          <t>Note: As shown in <xref target="embed_meas_unit"/>, the Measurement Unit and target hardware component share the same die. Therefore, they are in the same physical security perimeter. This may have an impact on the trust model (see <xref target="supply-chain-attacks"/>).</t>
        </section>
        <section anchor="external-measurement-unit">
          <name>External Measurement Unit</name>
          <t>In the following integration models, the Measurement Unit is external to the target hardware component.</t>
          <section anchor="discrete-mu">
            <name>Discrete Component</name>
            <t>The Measurement Unit is a discrete component external to the target hardware component and to the Attesting Environment.</t>
            <figure anchor="discrete_meas_unit">
              <name>Abstract Representation of Discrete Measurement Unit</name>
              <artwork align="center"><![CDATA[
                    Trigger                             
+-------------+   Measurement  +------------------+     
|             +---------------->                  |     
|             |                | Measurement Unit |     
|             <----------------+       (AE)       |     
|             |     Export     +---------^--------+     
|  Attesting  |   Measurement            |              
| Environment |                          | Data Exchange
|             |                          |              
|             |                  +-------v-------+      
|             |                  |   Target HW   |      
|             |                  |   Component   |      
+-------------+                  |      (TE)     |      
                                 +---------------+      
]]></artwork>
            </figure>
            <t>Ex: Sensors added on top of hardware component, Power Management IC (PMIC), Baseboard Management Controller (BMC).</t>
            <t>In this integration model, the target hardware component and Measurement Unit can come from different sources (e.g., foundries). That can be leveraged to draw trust boundaries between the AE, TE and Measurement Unit.
Using a discrete component implies the existence of physical communication channels between the AE, TE and Measurement Unit on which data such as measurement will transit. This introduces attack vectors. Refer to <xref target="seccons"/>.</t>
          </section>
          <section anchor="integrated-mu">
            <name>Integrated in Attesting Environment</name>
            <t>The Measurement Unit is physically integrated in the Attesting Environment. It can take the form of hardware circuitry or be a software component. As the Measurement Unit is integrated in the Attesting Environment, the Trigger and Export interfaces are not represented in <xref target="integrated_meas_unit"/>.</t>
            <figure anchor="integrated_meas_unit">
              <name>Abstract Representation of Measurement Unit Integrated in AE</name>
              <artwork align="center"><![CDATA[
+-------------------+                           
|     Attesting     |                           
|    Environment    |                           
|                   |                           
|  +-------------+  |   Data   +---------------+
|  | Measurement |  | Exchange |   Target HW   |
|  |    Unit     <--+---------->   Component   |
|  +-------------+  |          |      (TE)     |
|                   |          +---------------+
+-------------------+                           
]]></artwork>
            </figure>
            <t>Ex: Software logic (e.g., FIPS KAT)</t>
            <t>Note: This integration model can be limiting in terms of what it is possible to measure.</t>
            <t>Of course, both embedded and external Measurement Units can be found in the same system and possibly, a combination of embedded and external can be used to measure a single Target Environment (see the practical example in <xref target="ex-dual-mu"/>).</t>
            <t>A single Attesting Environment can be responsible for one or more target hardware components. The Attesting Environment is therefore responsible for building Evidence for all of its target hardware components.</t>
            <t>In addition to that, there may be multiple Attesting Environments. That case is discussed in <xref target="I-D.richardson-rats-composite-attesters"/>.</t>
          </section>
        </section>
      </section>
      <section anchor="measurement-journey">
        <name>Measurement Journey</name>
        <t>Measurements of hardware components must be included in the Evidence to be sent to a Verifier. This implies that the Attesting Environment possesses a way to start the computation of the measurement (trigger), to securely retrieve the measurement (collection) and to securely embed the measurement in Evidence. During the completion of all these steps, the attacker has many opportunities to tamper with the integrity of the measurement or the execution logic (hardware or software).</t>
        <t>Below are the identified steps of the journey of a measurement at the hardware level. These are important as this document implies a security model in which the attacker can tamper with hardware.</t>
        <ol spacing="normal" type="1"><li>
            <t>Trigger computation  </t>
            <t>
Measurement computation is triggered by an event (boot, external request, watchdog) or continuous. The Attesting Environment is able to trigger the computation of the measurement through the Trigger interface.</t>
          </li>
          <li>
            <t>Compute measurement  </t>
            <t>
The measurement of the target hardware component is computed by the Measurement Unit.</t>
          </li>
          <li>
            <t>Export measurement  </t>
            <t>
Once the measurement has been computed, it must be exported in order to be accessible by the Attesting Environment. The measurement transits from the Measurement Unit to the Attesting Environment through the export interface.  </t>
            <t>
Protection of the measurement in transit against tampering is critical for its trustworthiness. An attacker must not be able of tampering with the measurement in transit. This can be achieved by using bus protection techniques.</t>
          </li>
          <li>
            <t>[optional] Store measurement  </t>
            <t>
It is possible that the measurement will not be directly included in Evidence but instead stored until it is effectively included in Evidence by the Attesting Environment.  </t>
            <t>
The measurement must be securely stored in the boundary of the Attesting Environment. An attacker must not be able of tampering with the measurement while it is at rest.</t>
          </li>
          <li>
            <t>[optional] Process measurement  </t>
            <t>
It is possible that the measurement will not be directly included in Evidence as is but instead needs to be processed first before being effectively included in Evidence by the Attesting Environment.  </t>
            <t>
The processing of the measurement must be securely operated in the boundary of the Attesting Environment. An attacker must not be able of tampering with the processing logic.</t>
          </li>
          <li>
            <t>Include measurement in Evidence  </t>
            <t>
The Attesting Environment is responsible for including the measurement data in Evidence. This operation must be carried out securely. An attacker must not be able to tamper with this logic.  </t>
            <t>
Note: At that point, the Evidence is not signed yet and could still be tampered by an attacker, possibly without being detected.</t>
          </li>
          <li>
            <t>Sign Evidence  </t>
            <t>
The signature operation must be carried out securely. An attacker must not be able to modify the content of the Evidence or forging signature for compromised data.  </t>
            <t>
For instance, if the signature operation is offloaded to a remote hardware component and thus Evidence content must transit on a bus to reach this component, the attacker must not be able to manipulate data in transit (measurement, outputted signature).  </t>
            <t>
Once stored in signed Evidence, the measurement is considered safe from unauthorized modification. This is because the cryptographic signature of the Evidence ensures integrity protection.</t>
          </li>
        </ol>
        <t><xref target="meas_journey"/> represents the steps of the measurement journey described above.</t>
        <figure anchor="meas_journey">
          <name>Measurement Journey</name>
          <artwork align="center"><![CDATA[
+-------------------------+ Trigger                               
|  Attesting Environment  | Measurement +------------------------+
|                         +------------->    Measurement Unit    |
|                         |             |                 |      |
| +---------------------+ |             |      Compute    |      |
| |      [Optional]     | |             |      Measurement|      |
| | Measurement Storage <-+-------------+    +------------v-+    |
| +----------+----------+ | Export      |    |    Target    |    |
|            |            | Measurement |    |   Hardware   |    |
| +----------v----------+ |             |    |   Component  |    |
| |[Optional] Processing| |             |    +--------------+    |
| +----------+----------+ |             +------------------------+
|            |            |                                       
| +----------+----------+ |                                       
| | +--------v--------+ | |                                       
| | |     Include     | | |                                       
| | |  measurement in | | |                                       
| | |     Evidence    | | |                                       
| | +-----------------+ | |                                       
| |                     | |                                       
| |     Sign Evidence   | |                                       
| +---------------------+ |                                       
|                         |                                       
+-------------------------+                                       
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="conceptual-messages">
      <name>Inclusion in Conceptual Messages</name>
      <t>This section introduces standard claims to be included in RATS Conceptual Messages. Conceptual Messages are defined in <xref section="8" sectionFormat="of" target="RFC9334"/>. The RATS architecture does not mandate the usage of standard data formats for Conceptual Messages but protocols may require specific formats. Nonetheless, RATS proposed CoRIM for Endorsements and Reference Values and EAT for Evidence as standard data models. The CoRIM is defined in <xref target="I-D.ietf-rats-corim"/> and the EAT is defined in <xref target="RFC9711"/>.</t>
      <t>To promote interoperability, the following sections showcase how to use the CoRIM and EAT data models in the context of this document.</t>
      <section anchor="endorsements">
        <name>Endorsement</name>
        <t>Endorsements in the scope of this document contain metadata describing the characteristics of Measurement Units and target hardware components that are necessary for the Verifier to correctly appraise Evidence.</t>
        <t>These may include environmental robustness properties (e.g., operating temperature range, resistance to environmental conditions), Measurement Unit characteristics (e.g., accuracy, precision, uncertainty, sampling rate, sample count, method), calibration data (e.g., calibration coefficients and drift models over operational context), semantics of measurements (e.g., unit, scale, interpretation) and where applicable, the characteristics of reference or behavioral models to be used by the Verifier during appraisal.</t>
        <t>TODO: if the unit of the measurement is specified in here, is it possible to reuse IANA numbers for Sensor Measurement Lists: https://www.iana.org/assignments/senml/senml.xhtml</t>
        <section anchor="concise-reference-integrity-manifest-corim">
          <name>Concise Reference Integrity Manifest (CoRIM)</name>
          <t>Endorsements can be written inside a CoMID Endorsed Values triple of a CoRIM (see <xref section="5.1.6" sectionFormat="of" target="I-D.ietf-rats-corim"/>). The Endorsed Values triple holds one or more measurement-map that are used to write the Endorsements.</t>
        </section>
      </section>
      <section anchor="reference-value">
        <name>Reference Value</name>
        <t>Reference Values must be computed in a secure environment.</t>
        <t>The Reference Value computed must correspond to the value that will be outputted in the expected environment of the system once in mission. For instance, a measurement might be dependent of the environmental conditions surrounding the system. This must be taken into account as a measurement different from the Reference Value does not necessarily mean bad behavior. If such context-dependent parameters cannot be foreseen, it is possible to include additional data in Evidence to give details about the context in which the measurement has been computed (see <xref target="operational-context"/>). The Verifier will then use these additional data to select the Reference Value that should be used in the context described by the additional data (kind of conditional Reference Values). This implies that attacker cannot modify these additional data otherwise, an attacker would be able to fool a Verifier into choosing Reference Values that don't correspond to the actual context of the system.</t>
        <t>Depending on the type of measurement and target hardware component, the Reference Value can be a value or a range or a function* of the operational context of the system and can correspond to a class, a group or an instance of target hardware component.</t>
        <t>*could even be a ML model to detect abnormal physical properties depending on operational context of the system.</t>
        <section anchor="concise-reference-integrity-manifest-corim-1">
          <name>Concise Reference Integrity Manifest (CoRIM)</name>
          <t>Reference Values can be written inside a CoMID Reference Values triple of a CoRIM (see <xref section="5.1.5" sectionFormat="of" target="I-D.ietf-rats-corim"/>). The Reference Values triple holds one or more measurement-map that are used to write the Reference Values.</t>
        </section>
      </section>
      <section anchor="evidence">
        <name>Evidence</name>
        <t>The current version of this document proposes several approaches for including hardware component measurements in Evidence. For now, these options are present as brainstorming, to explore the different possibilities and may be removed in future versions of this document.</t>
        <section anchor="eat-claims">
          <name>Entity Attestation Token (EAT)</name>
          <section anchor="using-eat-measured-component-claim">
            <name>Using EAT Measured Component Claim</name>
            <t>It is possible for some measurements to be represented in an already existing EAT Measured Component. The EAT Measured Component is defined in <xref target="I-D.ietf-rats-eat-measured-component"/>.</t>
            <t>For instance, a custom measurement structure can be used to hold hardware component measurement in the "measurement" field of the "measured-component" structure from <xref target="I-D.ietf-rats-eat-measured-component"/>. Also, the flag field can be used to extend the measured-component base type with profile-defined semantics.</t>
          </section>
          <section anchor="measres">
            <name>Using EAT Measurement Result Claim</name>
            <t>It is possible for some measurements to be represented in an already existing EAT Measurement Result. The EAT Measurement Result is defined in <xref section="4.2.17" sectionFormat="of" target="RFC9711"/>.</t>
            <t>This claim could be well-suited for measurements with on-device comparisons with reference values. For instance, self-tests (e.g., BIST, KAT) verify that the computed measurement corresponds to an expected value and output results such as "success" or "failure". In that case, a Measurement Result claim can be used.</t>
          </section>
          <section anchor="using-eat-submodule-claim">
            <name>Using EAT Submodule Claim</name>
            <t>TODO it seems that the EAT Submodule can be used to embed hardware components claims (maybe only more complete subsystems not simple hardware components). Research if it could be extended to include measurements. Especially relevant if the submodule does not have its own Attesting Environment (<xref section="4.2.18" sectionFormat="of" target="RFC9711"/>).</t>
          </section>
          <section anchor="mhwc">
            <name>Using Measured Hardware Component Claims</name>
            <t>This section proposes a new claim, the "Measured Hardware Component", to represent what is described in this document. This claim is presented in case the already existing claims mentioned above are not sufficient to correctly report measurements of hardware components.</t>
            <t>The "measured hardware component" claim is inspired from the "measured component" claim introduced in <xref target="I-D.ietf-rats-eat-measured-component"/>.</t>
            <!-- The resemblance is beneficial for comprehension and makes implementation easier. -->

<!-- The following claims are defined according to the guidelines presented in {{Appendix E of RFC9711}}. -->

<section anchor="information-model">
              <name>Information Model</name>
              <t>This section presents the information model of a "measured hardware component".</t>
              <t>The information elements (IEs) that constitute a "measured hardware component" are described in <xref target="tab-mhwc-info-elems"/>.</t>
              <table anchor="tab-mhwc-info-elems">
                <name>Measured Hardware Component Information Elements</name>
                <thead>
                  <tr>
                    <th align="left">IE</th>
                    <th align="left">Description</th>
                    <th align="left">Requirement Level</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Component Name</td>
                    <td align="left">The name given to the target hardware component.</td>
                    <td align="left">
                      <bcp14>REQUIRED</bcp14></td>
                  </tr>
                  <tr>
                    <td align="left">Operational Context</td>
                    <td align="left">Additional information on the operational context of the component.</td>
                    <td align="left">
                      <bcp14>OPTIONAL</bcp14></td>
                  </tr>
                  <tr>
                    <td align="left">Measurement List</td>
                    <td align="left">List of measurements for the target hardware component. Each element of the list is composed of a Measurement Type and of a Measurement Value.</td>
                    <td align="left">
                      <bcp14>REQUIRED</bcp14></td>
                  </tr>
                </tbody>
              </table>
              <section anchor="component-name">
                <name>Component Name</name>
                <t>Component Name is used to identify the target hardware component.</t>
              </section>
              <section anchor="operational-context">
                <name>Operational Context</name>
                <t>Additional information on the operational context of the component. These can be used by the Verifier to appraise measurements.</t>
                <t>By being placed at this level of the Measured Hardware Component claim, the operational context is shared by every measurement of the target hardware component. It is important that the operational context sampled corresponds to the actual operational context at the time of measurement computations (i.e., sampling of the operational context and computation of the measurements must be executed simultaneously (approximately). Otherwise, Time-Of-Check to Time-Of-Use (TOCTOU) attacks would be possible).</t>
                <t>A lot of data can be included in Operational Context such as environmental (e.g., temperature, humidity, radiation), electrical (e.g., voltage, clock frequency, power state), workload (e.g., workload level, type), temporal (timestamp, uptime), system operation (degraded mode, thermal throttling) contexts.</t>
                <t>TODO fill table. Operational Context is highly dependent on what is needed by Verifier which depends on what is measured and also what are the available sensors etc. so it will either contain a lot of optional fields or be profile-specific.</t>
                <table anchor="tab-op-ctx-fields">
                  <name>Fields of the Operational Context</name>
                  <thead>
                    <tr>
                      <th align="left">Field Name</th>
                      <th align="left">Description</th>
                      <th align="left">Requirement Level</th>
                    </tr>
                  </thead>
                  <tbody>
                    <tr>
                      <td align="left"> </td>
                      <td align="left"> </td>
                      <td align="left"> </td>
                    </tr>
                  </tbody>
                </table>
                <t>Use case example: the measurement may be subject to variations depending on environmental context such as temperature (ideally specified in Endorsements, see <xref target="endorsements"/>). A measurement value might be acceptable when computed in a context of extreme cold but not if computed at room temperature. The Verifier must therefore be aware of the temperature surrounding the component to decide if the measurement corresponds to good behavior or not. The Verifier will therefore base its appraisal on the environmental context reported in Operational Context.</t>
                <t>Note: Information in Operational Context is sensitive and must have the same level of protection as the measurements.</t>
              </section>
              <section anchor="measurement-list">
                <name>Measurement List</name>
                <table anchor="tab-meas-list-elem-fields">
                  <name>Content of Elements of the Measurement List</name>
                  <thead>
                    <tr>
                      <th align="left">Field Name</th>
                      <th align="left">Description</th>
                      <th align="left">Requirement Level</th>
                    </tr>
                  </thead>
                  <tbody>
                    <tr>
                      <td align="left">Measurement Unit Identifier</td>
                      <td align="left">Identifier for the Measurement Unit used to obtain the measurement</td>
                      <td align="left">
                        <bcp14>REQUIRED</bcp14></td>
                    </tr>
                    <tr>
                      <td align="left">Measurement Type</td>
                      <td align="left">The type of the measurement.</td>
                      <td align="left">
                        <bcp14>REQUIRED</bcp14></td>
                    </tr>
                    <tr>
                      <td align="left">Measurement Value</td>
                      <td align="left">The Value of the measurement. The content of this field depends on the Measurement Type.</td>
                      <td align="left">
                        <bcp14>REQUIRED</bcp14></td>
                    </tr>
                  </tbody>
                </table>
                <ul spacing="normal">
                  <li>
                    <t>Measurement Unit Identifier:</t>
                  </li>
                </ul>
                <t>Identifier for the Measurement Unit used to compute the measurement.</t>
                <t>For instance there may be multiple sensors used to measure a single property of the target hardware component. In that case, the Measurement Unit Identifier allows to identify the Measurement Unit that was used.</t>
                <ul spacing="normal">
                  <li>
                    <t>Measurement Type:</t>
                  </li>
                </ul>
                <t>Specifier for the type of the measurement.</t>
                <t>For example, the type can be used to specify if the measurement is the result of a self-test, the sampling of a physical property, a trace or an event (see <xref target="cddl-meas-val"/>).</t>
                <ul spacing="normal">
                  <li>
                    <t>Measurement Value:</t>
                  </li>
                </ul>
                <t>The structure that holds the actual measurement. The structure of the Measurement Value depends on the Measurement Type.</t>
              </section>
            </section>
          </section>
        </section>
        <section anchor="x509-certificate">
          <name>X.509 Certificate</name>
          <t><xref section="C.3" sectionFormat="of" target="RFC9711"/> describes methods to encode EAT claims in an X.509 certificate. These methods can be used for the claims presented in <xref target="eat-claims"/>.</t>
          <t>Ex: DICE uses X.509 certificates with a custom extension to carry Evidence <xref target="TCG-DICE"/>. TLS and DTLS extended with remote attestation also use X.509 certificates with an attestation extension <xref target="I-D.fossati-tls-attestation"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="cddl-definitions">
      <name>CDDL Definitions</name>
      <t>This section presents CDDL definitions for the Measured Hardware Component claim to be included in EAT Measurement claim.</t>
      <section anchor="meas-hw-comp-claim">
        <name>Measured Hardware Component Claim</name>
        <figure anchor="meas_hw_comp">
          <name>CDDL of Measured Hardware Component Claim</name>
          <sourcecode type="cddl"><![CDATA[
measured-hw-component = {
      component-id-label => component-id
      ? operational-ctx-label => operational-ctx
      measurement-list-label => [ + hw-measurement ]
   }

operational-ctx = {
   ; structure for operational context
}

hw-measurement = {
      measurement-unit-id => tstr
      measurement-type-label => measurement-type   ; a choice
      measurement-value-label => measurement-value ; depends of type
   }

measurement-type =
   mt-self-test /
   mt-phys-prop /
   mt-event /
   mt-trace /
   mt-other ; profile

measurement-value = ; structure that depends of type
   mv-self-test /
   mv-phys-prop /
   mv-event /
   mv-trace /
   mv-other ; profile

]]></sourcecode>
        </figure>
        <section anchor="cddl-meas-val">
          <name>Measurement Value</name>
          <section anchor="physical-property">
            <name>Physical Property</name>
            <t>CDDL definition of the structure of measurement-value when measurement-type = mt-phys-prop.</t>
            <figure anchor="mv_phys_prop">
              <name>CDDL of Physical Property Measurement Value</name>
              <sourcecode type="cddl"><![CDATA[
mv-phys-prop = {
   physical-property-id => tstr,
   value => number / bstr / tstr,
   ; unit, precision, scale, uncertainty,
   ; are already specified in Endorsements
}
]]></sourcecode>
            </figure>
          </section>
          <section anchor="self-test">
            <name>Self-Test</name>
            <t>CDDL definition of the structure of measurement-value when measurement-type = mt-self-test.</t>
            <figure anchor="mv_self_test">
              <name>CDDL of Self-Test Measurement Value</name>
              <sourcecode type="cddl"><![CDATA[
mv-self-test = {
   test-id => tstr,
   test-result-label => self-test-result,
}

self-test-result =
    st-pass /
    st-fail /
    st-degraded /
    st-not-run /
    st-unknown

]]></sourcecode>
            </figure>
          </section>
          <section anchor="event">
            <name>Event</name>
            <t>CDDL definition of the structure of measurement-value when measurement-type = mt-event.</t>
            <figure anchor="mv_event">
              <name>CDDL of Event Measurement Value</name>
              <sourcecode type="cddl"><![CDATA[
mv-event = {
  event-id => tstr,
  event-status-label => event-status,
  ? event-count => uint,
  ? event-time => int / uint
}

event-status =
    e-detected /
    e-not-detected /
    e-active /
    e-inactive /
    e-unknown
]]></sourcecode>
            </figure>
          </section>
          <section anchor="trace">
            <name>Trace</name>
            <t>CDDL definition of the structure of measurement-value when measurement-type = mt-trace.</t>
            <figure anchor="mv_trace">
              <name>CDDL of Trace Measurement Value</name>
              <sourcecode type="cddl"><![CDATA[
mv-trace = {
  trace-type-label => trace-type,
  trace-data => bstr / tstr
}

trace-type =
    digest /
    summary /
    counter

]]></sourcecode>
            </figure>
          </section>
          <section anchor="other">
            <name>Other</name>
            <t>CDDL definition of the structure of measurement-value when measurement-type = mt-other.</t>
            <t>TODO additional structures could be defined in a profile. Simply, the Measurement Value could be raw bytes that the Verifier would understand (by using a profile).</t>
          </section>
        </section>
      </section>
      <section anchor="inclusion-in-eat-measurement-claim">
        <name>Inclusion in EAT Measurement Claim</name>
        <t>The CDDL defined in <xref target="meas-hw-comp-claim"/> extends the $measurements-body-cbor and $measurements-body-json EAT sockets to add support for the measured-hw-component to the Measurements claim (<xref section="4.2.16" sectionFormat="of" target="RFC9711"/>).</t>
        <figure anchor="mhwc_claims">
          <name>CDDL Extension of EAT Measurement Body</name>
          <sourcecode type="cddl"><![CDATA[
mhwc-cbor = bytes .cbor measured-hw-component
mhhwc-json = text .json measured-hw-component

; EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= mhwc-cbor

; EAT JSON (`.feature "json"`)
$measurements-body-json /= mhwc-json
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="practical-examples">
      <name>Practical Examples</name>
      <t>This section is for informational purposes only.</t>
      <t>Note: There are many interesting examples of hardware monitoring in <xref target="ISO5891"/> that are not covered here but fall in the scope of this document.</t>
      <section anchor="monitoring-physical-properties">
        <name>Monitoring Physical Properties</name>
        <section anchor="using-a-discrete-component-sensor">
          <name>Using a Discrete Component Sensor</name>
          <t>In this scenario, the Measurement Unit is implemented as a discrete external sensor, such as a temperature sensor or a Power Monitoring Integrated Circuit (PMIC). The Target Environment is the hardware component under observation, for example a CPU. This corresponds to the integration model described in <xref target="discrete-mu"/>.</t>
          <t>The Measurement Unit observes physical properties of the Target Environment through a physical coupling, such as thermal conduction or electrical interaction (which in the model, corresponds to the Data Exchange channel), and exports digitized measurements to the Attesting Environment through the Export interface.</t>
          <t>The Attesting Environment collects these measurements and includes them in Evidence, along with, if possible, contextual information describing the operational conditions under which the measurements were obtained.</t>
          <t>In this model, the Measurement Unit is external to the Target Environment and may originate from a different manufacturer. As a result, the trustworthiness of the measurements depends on the integrity and characteristics of the sensor, which can be established through Endorsements describing its properties such as precision, calibration, and operating conditions (refer to <xref target="endorsements"/>).</t>
          <t>During appraisal, the Verifier evaluates the measurements against Reference Values that may depend on the operational context. These Reference Values may be expressed as fixed ranges, condition-dependent functions, or behavioral models. The Verifier could use advanced models, including statistical or machine learning-based approaches, to detect anomalies (but such models would be part of the Appraisal Policy for Evidence and are not encoded in Evidence).</t>
          <t>Note: compared to embedded Measurement Units, this model introduces additional attack surfaces, including sensor spoofing, manipulation of communication channels, and environmental interference. These risks must be considered in the system design and threat model (see <xref target="seccons"/>).</t>
        </section>
        <section anchor="using-an-embedded-sensor">
          <name>Using an Embedded Sensor</name>
          <section anchor="generic-example">
            <name>Generic Example</name>
            <t>In this scenario, the Measurement Unit is implemented as an on-die sensor integrated within the target hardware component. This corresponds to the embedded Measurement Unit model described <xref target="embedded-mu"/>.</t>
            <t>The Measurement Unit observes physical properties of the Target Environment, such as temperature, voltage, or timing behavior, through direct internal coupling. Measurements are computed and made available to the Attesting Environment through internal interfaces, such as memory-mapped registers, without traversing external communication channels.</t>
            <t>The Attesting Environment collects these measurements and includes them in Evidence, optionally along with operational context information to support appraisal.</t>
            <t>As the Measurement Unit is physically integrated within the Target Environment, both share the same trust domain and physical security perimeter. The integrity of the Measurement Unit is typically established through Endorsements rather than through runtime measurement.</t>
            <t>During appraisal, the Verifier evaluates the measurements against Reference Values that may depend on the operational context. As with other physical measurements, these Reference Values may be expressed as ranges, condition-dependent functions, or behavioral models.</t>
            <t>Note: Compared to external sensors, this model reduces the attack surface by eliminating external communication channels and increasing the binding between the measurement and the component. However, it also reduces independence, as both the Target Environment and the Measurement Unit may be affected by the same faults or compromises. For instance, refer to <xref target="supply-chain-attacks"/>.</t>
          </section>
          <section anchor="using-a-ring-oscillator">
            <name>Using a Ring Oscillator</name>
            <t>In this scenario, the Measurement Unit is implemented as a ring oscillator integrated within the Target Environment. This corresponds to the embedded Measurement Unit model described <xref target="embedded-mu"/>.
The oscillator frequency depends on physical and electrical properties of the hardware, including voltage, temperature, and process variations.</t>
            <t>The Measurement Unit produces a digital representation of its oscillation frequency, which is collected by the Attesting Environment through an embodiment of the Export interface, then included in Evidence. These measurements provide an indirect observation of the physical state of the component and can be used to detect anomalies such as voltage glitches, thermal variations, or aging effects.</t>
            <t>During appraisal, the Verifier evaluates the reported frequency against Reference Values that depend on the operational context and calibration data provided through Endorsements.</t>
            <t>Note: As this model is very sensitive to physical perturbations, deviations may have multiple possible causes. Therefore, the interpretation of measurements requires operational context. Ring oscillator measurements can then be used to complement other measurement types by providing continuous monitoring of the hardware physical and electrical behavior.</t>
          </section>
        </section>
      </section>
      <section anchor="ex-self-test">
        <name>Detection by Self-Testing</name>
        <t>This section provides practical examples that demonstrate how self-tests can be leveraged to measure a hardware component.</t>
        <section anchor="using-built-in-self-tests-bist">
          <name>Using Built-In-Self-Tests (BIST)</name>
          <t>In this scenario, the Measurement Unit is implemented as Built-In Self-Test (BIST) circuitry integrated within the Target Environment, for example within a memory subsystem or a cryptographic accelerator. This corresponding to the embedded Measurement Unit integration model described in <xref target="embedded-mu"/>.</t>
          <t>The BIST logic executes predefined test patterns and compares the observed behavior of the component against expected results, producing a pass/fail outcome or a diagnostic signature. These tests may be executed at boot time or periodically during runtime.</t>
          <t>The Attesting Environment collects the BIST results and includes them in Evidence as measurements associated with the corresponding target hardware component structured according to a Measurement Result or a Measured Hardware Component claim defined respectively in <xref target="measres"/> and <xref target="mhwc"/>.</t>
          <t>During appraisal, the Verifier compares the reported test results against Reference Values, typically expecting a successful outcome. Unlike measurements of physical properties, BIST results are deterministic and do not require contextual interpretation. In such case, the operational context is not used.</t>
          <t>Note: This model provides strong assurance of functional correctness of the target hardware component and complements physical measurements by detecting faults that may not be observable through sensors.</t>
        </section>
        <section anchor="trng-entropy-evaluation-by-an-embedded-measurement-unit">
          <name>TRNG Entropy Evaluation by an Embedded Measurement Unit</name>
          <t>In this scenario, the Target Environment is the TRNG hardware component, whose entropy source constitutes the subject of the measurement. The Measurement Unit is implemented as on-die hardware logic tightly coupled to the TRNG, corresponding to the embedded Measurement Unit integration model described in <xref target="embedded-mu"/>.</t>
          <t>The Measurement Unit continuously or periodically evaluates the entropy source by executing health tests and entropy estimators (Section 4 of <xref target="NIST-SP-800-90B"/>). Measurements are obtained through a Data Exchange channel, without traversing any software-accessible bus, and are exported directly to the Attesting Environment via the Export interface.</t>
          <t>The Attesting Environment is the system ROM, which collects the measurement outputs and embeds them into Evidence (EAT, X.509 certificate). The Evidence includes multiple measurements for the TRNG component, such as health test results and minimum entropy values, structured according to the Measurement Result or Measured Hardware Component claim defined respectively in <xref target="measres"/> and <xref target="mhwc"/>.</t>
          <t>During appraisal, the Verifier validates the signature using the manufacturer’s endorsement chain, then evaluates the measurements against Reference Values. Health test results are expected to indicate a passing state, and entropy values are compared against policy-defined thresholds.</t>
          <t>Note: In this integration model, the Measurement Unit and Target Environment share the same physical security perimeter. As a result, the integrity of the Measurement Unit is not independently verified at runtime but is instead covered by manufacturer endorsements.</t>
        </section>
        <section anchor="trng-entropy-evaluation-by-a-software-measurement-unit">
          <name>TRNG Entropy Evaluation by a Software Measurement Unit</name>
          <t>In this scenario, the Target Environment is the TRNG, while the Measurement Unit is implemented as a software component executing within the Attesting Environment. This corresponds to the integration model described in <xref target="integrated-mu"/>.</t>
          <t>The Measurement Unit obtains raw samples from the TRNG via a software interface and computes entropy-related measurements. As the Measurement Unit operates in software, its integrity must be established before its output can be trusted. This falls in the category of classical software measurements already specified by RATS documents.</t>
          <t>The Evidence includes the entropy measurements produced by the software Measurement Unit.</t>
          <t>During appraisal, the Verifier first evaluates the integrity of the Measurement Unit by comparing the reported digest against reference values obtained from a CoRIM. Only if the Measurement Unit is recognized as intact does the Verifier proceed to evaluate the entropy measurements.</t>
          <t>This model introduces a dependency between the trustworthiness of the Measurement Unit and the validity of the measurements it produces. This dependency is always present but the trustworthiness of the MU is not always quantifiable (e.g., the MU cannot be measured), see <xref target="rot-comp"/>.</t>
        </section>
        <section anchor="ex-dual-mu">
          <name>TRNG Entropy Cross-Validation by Dual Measurement Units</name>
          <t>This scenario is a mix of the two previous ones. The Target Environment is the TRNG, while two Measurement Units operate concurrently: a hardware Measurement Unit embedded in the component and a software Measurement Unit integrated within the Attesting Environment. This corresponds to a combination of the integration models described in <xref target="embedded-mu"/> and <xref target="integrated-mu"/>.</t>
          <t>Each Measurement Unit independently computes entropy-related measurements based on the same underlying noise source. The Attesting Environment collects both sets of measurements, associates them with their respective Measurement Unit identifiers, and aggregates them into a single Evidence structure.</t>
          <t>This model enables cross-validation of measurements and allows the detection of silent failures affecting either one of the Measurement Units. A significant divergence between the two measurements may indicate faults, degradation, or inconsistencies in the measurement process, even when individual measurements satisfy their respective thresholds.</t>
          <t>The Evidence, in this case, contains multiple measurements for the same target hardware component, originating from distinct Measurement Units.</t>
        </section>
      </section>
      <section anchor="detection-of-active-tampering">
        <name>Detection of Active Tampering</name>
        <t>In this generic scenario, the Measurement Unit consists of tamper detection circuitry, such as an active mesh, voltage glitch detector, or light sensor, integrated within the hardware component.</t>
        <t>These mechanisms do not produce measurements of physical properties but instead generate event-driven signals indicating potential tampering or fault conditions. Such signals may be triggered by physical intrusion, abnormal voltage or clock conditions, or environmental disturbances.</t>
        <t>The Attesting Environment collects the status of these detectors and includes them in Evidence as security-relevant events or status indicators.</t>
        <t>During appraisal, the Verifier interprets these signals according to an Appraisal Policy, typically treating any indication of tampering as a critical failure condition. Unlike other measurements, the absence of an alert does not guarantee the absence of an attack, but the presence of an alert provides strong evidence of compromise.</t>
        <t>These mechanisms complement other measurement types by providing direct detection of active physical attacks and environmental anomalies.</t>
      </section>
      <section anchor="detection-using-traces">
        <name>Detection Using Traces</name>
        <t>In this generic scenario, the Measurement Unit consists of hardware trace logic integrated within the Target Environment, such as Arm CoreSight, Intel Processor Trace, or Nexus trace modules.</t>
        <t>These mechanisms observe the execution of the Target Environment and produce trace data reflecting instruction flow, memory accesses, or system events. Due to the high volume of trace data, the Attesting Environment typically processes or summarizes this information before including it in Evidence.</t>
        <t>The resulting measurements may consist of aggregated statistics, cryptographic digests of trace segments, or derived indicators of anomalous behavior.</t>
        <t>During appraisal, the Verifier evaluates these measurements against behavioral models describing expected execution patterns. These models may be expressed as statistical profiles or more advanced classifiers in the Appraisal Policy for Evidence.</t>
        <t>Trace-based measurements provide insight into the runtime behavior of the Target Environment and can reveal anomalies that are not detectable through static measurements or physical sensors. However, they require careful processing and interpretation and may introduce additional considerations related to data volume, confidentiality, and trust in the trace collection infrastructure.</t>
      </section>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>The security considerations of RATS architecture apply (<xref section="12" sectionFormat="of" target="RFC9334"/>). This section also mentions protection against physical attacks. These attacks are particularly relevant for this draft as collecting claims about hardware components implies a risk of physical compromise. Aging and action of environment on the system are also considered threats.</t>
      <t>The security considerations of EAT Measured Component apply (<xref section="5" sectionFormat="of" target="I-D.ietf-rats-eat-measured-component"/>) when using EAT Measured Component claim or Measured Hardware Component Claim.</t>
      <t>The security considerations related to X.509 certificates apply (<xref section="8" sectionFormat="of" target="RFC5280"/>) when using X.509 certificates to carry Evidence.</t>
      <t>Security considerations of CoRIM apply (<xref section="11" sectionFormat="of" target="I-D.ietf-rats-corim"/>) when using CORIM for Endorsements and Reference Values.</t>
      <t>The following subsections are mainly focused on security considerations regarding the Attester during the steps of the Measurement Journey (see <xref target="measurement-journey"/>).</t>
      <section anchor="rot-comp">
        <name>Root of Trust Components</name>
        <t>Some components are essential for attestation (storage of attestation key, hardware Measurement Unit, etc.), if these are tampered with, there is no way to build trustworthy Evidence. These are considered the Root of Trust (RoT) for attestation because their correct functioning cannot be proved through attestation.</t>
        <t>These are to be put in contrast with other components that are not critical for attestation (although they can be critical for the security of the system itself !).</t>
      </section>
      <section anchor="multiple-attesting-environments">
        <name>Multiple Attesting Environments</name>
        <t>In case of multiple Attesting Environments, distribution of freshness and binding of Evidence are discussed in <xref target="I-D.richardson-rats-composite-attesters"/>.</t>
      </section>
      <section anchor="invasive-accesses">
        <name>Invasive Accesses</name>
        <t>An attacker must not be able to leverage a Measurement Unit to access protected assets. For instance, access to protected assets can happen when computing measurements by using internal debug mechanisms (e.g., TAP controllers).</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <section anchor="software-attacks">
          <name>Software Attacks</name>
          <t>There exist software attacks that can have a direct impact on hardware components’ behavior. These are ideally mitigated by good and secure development practices but in case they happen, these attacks can be detected by monitoring physical properties of the component (such as power consumption, thermal and electromagnetic signatures, timing).</t>
          <t>Ex: Software-induced Denial-of-Service (DoS).</t>
          <t>Ex: Manipulation of privileged power control interface.</t>
        </section>
        <section anchor="physical-attacks">
          <name>Physical Attacks</name>
          <t>Physical attacks target the hardware of the system. They imply physical access to the system during its mission mode or while it is in the supply chain.</t>
          <section anchor="passive-attacks">
            <name>Passive Attacks</name>
            <t>Passive physical attacks are used by attackers to leak information through analysis of system physical properties. Passive attacks, by definition, do not modify behavior of the system and therefore cannot alter the correct functioning of the attestation flow.</t>
            <t>Ex: Side channel analysis of physical properties (EM emissions, power consumption, timing, temperature, probing, etc.)</t>
            <t>The danger with passive attacks resides in the extraction of sensitive assets and particularly attestation key used to sign Evidence, which can be used for impersonation and Evidence forgery. This is already tackled in <xref section="12.1.1" sectionFormat="of" target="RFC9334"/>.</t>
          </section>
          <section anchor="active-attacks">
            <name>Active Attacks</name>
            <t>Active physical attacks are the main problem since they allow an attacker (or a “natural” physical event) to tamper with the integrity of assets and execution flows of the system. These may therefore modify measurements in transit or at rest, inject arbitrary data in Evidence or bypass sensitive operations.</t>
            <t>Ex: Attacks on bus (Active man-in-the-middle (MITM), injection, probing) or anywhere measurements are in transit before being integrated in a structure that cannot be tampered or spoofed (signed Evidence).</t>
            <t>Ex: Glitching, fault injections to induce malicious behavior. May tamper with the target hardware component itself or the Measurement Unit or the logic used to build Evidence.</t>
            <t>Ex: Memory tampering attacks to modify stored measurements.</t>
            <t>Some techniques to mitigate physical attacks are usage of a Trusted Platform Module (TPM) or secure element for storage and correct execution of protected logic, bus protections, redundancy, sensors, active meshes, nose injection, etc. Note that some of these mitigations cannot directly prevent attacks but can be used for detection.</t>
          </section>
        </section>
        <section anchor="supply-chain-attacks">
          <name>Supply Chain Attacks</name>
          <t>Each stage of the supply chain introduces a new opportunity for an attacker to tamper with the produced system.</t>
          <t>Supply chains attacks may lead to the injection of Trojans. Once a Trojan has been triggered, its activity may be reflected on the physical properties of the component (modified timing, different power consumption). It is therefore possible, in some cases, to detect an active Trojan by comparing the physical properties of the component when the Trojan is active against the reference physical properties of the component. Note that, if the Measurement Unit is part of the component itself, which means that it has been integrated by the foundry that introduced the Trojan, then it cannot be trusted.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations of RATS architecture apply (<xref section="11" sectionFormat="of" target="RFC9334"/>).</t>
      <t>The privacy considerations of EAT Measured Component apply (<xref section="6" sectionFormat="of" target="I-D.ietf-rats-eat-measured-component"/>) when using EAT Measured Component claim or Measured Hardware Component Claim.</t>
      <t>Privacy considerations of CoRIM apply (<xref section="11" sectionFormat="of" target="I-D.ietf-rats-corim"/>) when using CORIM for Endorsements and Reference Values.</t>
      <t>TODO for reused claims privacy considerations are probably specified in other documents so refer to them.</t>
      <t>TODO In new claims, some fields may be dangerous for privacy. Some fields may enable tracking.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>It is possible that some measurement mechanisms may not be fully deterministic or may fail on rare occurrences or raise false positives.</t>
      <t>It is also possible that aging or environmental context affect sensors.</t>
      <t>These considerations must be taken into account and mitigated to an acceptable level by the designer.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.
TODO need IANA actions for claims defined in this document ?</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat-measured-component">
          <front>
            <title>Entity Attestation Token (EAT) Measured Component</title>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="20" month="February" year="2026"/>
            <abstract>
              <t>   The term "measured component" refers to an object within the
   attester's target environment whose state can be sampled and
   typically digested using a cryptographic hash function.  Examples of
   measured components include firmware stored in flash memory, software
   loaded into memory at start time, data stored in a file system, or
   values in a CPU register.  This document provides the information
   model for the "measured component" and two associated data models.
   This separation is intentional: the JSON and CBOR serializations,
   coupled with the media types and associated Constrained Application
   Protocol (CoAP) Content-Formats, enable the immediate use of the
   semantics within the Entity Attestation Token (EAT) framework.
   Meanwhile, the information model can be reused in future
   specifications to provide additional serializations, for example,
   using ASN.1.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-measured-component-12"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-10"/>
        </reference>
        <reference anchor="I-D.richardson-rats-composite-attesters">
          <front>
            <title>Taxonomy of Composite Attesters</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document clarifies and extends the meaning of Composite Attester
   from RFC9334.  A system of annotated diagram components is defined as
   a small language to explain the different ways that components can
   interact to form composites.  These diagram components are then used
   to define a few popular classes of composites.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-rats-composite-attesters-04"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="30" month="April" year="2025"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-09"/>
        </reference>
        <reference anchor="ISO5891" target="https://www.iso.org/fr/standard/81806.html">
          <front>
            <title>ISO/IEC TR 5891:2024, Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment</title>
            <author>
              <organization>International Standards Organization</organization>
            </author>
            <date year="2024" month="April"/>
          </front>
        </reference>
        <reference anchor="TCG-DICE" target="https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-r23-final.pdf">
          <front>
            <title>DICE Attestation Architecture, Version 1.00, Revision 0.23</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2021" month="March"/>
          </front>
        </reference>
        <reference anchor="NIST-SP-800-90B" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/nist.sp.800-90b.pdf">
          <front>
            <title>Recommendation for the Entropy Sources Used for Random Bit Generation</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2018" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 829?>

<section anchor="collected-cddl">
      <name>Collected CDDL</name>
      <t>This appendix contains all the CDDL definitions included in this document.</t>
      <sourcecode type="cddl"><![CDATA[
mhwc-cbor = bytes .cbor measured-hw-component
mhhwc-json = text .json measured-hw-component

; EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= mhwc-cbor

; EAT JSON (`.feature "json"`)
$measurements-body-json /= mhwc-json

measured-hw-component = {
      component-id-label => component-id
      ? operational-ctx-label => operational-ctx
      measurement-list-label => [ + hw-measurement ]
   }

operational-ctx = {
   ; structure for operational context
}

hw-measurement = {
      measurement-unit-id => tstr
      measurement-type-label => measurement-type   ; a choice
      measurement-value-label => measurement-value ; depends of type
   }

measurement-type =
   mt-self-test /
   mt-phys-prop /
   mt-event /
   mt-trace /
   mt-other ; profile

measurement-value = ; structure that depends of type
   mv-self-test /
   mv-phys-prop /
   mv-event /
   mv-trace /
   mv-other ; profile

mv-phys-prop = {
   physical-property-id => tstr,
   value => number / bstr / tstr,
   ; unit, precision, scale, uncertainty,
   ; are already specified in Endorsements
}

mv-self-test = {
   test-id => tstr,
   test-result-label => self-test-result,
}

self-test-result =
    st-pass /
    st-fail /
    st-degraded /
    st-not-run /
    st-unknown

mv-event = {
  event-id => tstr,
  event-status-label => event-status,
  ? event-count => uint,
  ? event-time => int / uint
}

event-status =
    e-detected /
    e-not-detected /
    e-active /
    e-inactive /
    e-unknown
    
mv-trace = {
  trace-type-label => trace-type,
  trace-data => bstr / tstr
}

trace-type =
    digest /
    summary /
    counter

]]></sourcecode>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to Sylvain Guilley for reviewing the document and providing valuable comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
