CPHAR's value depends entirely on the threat model it is read against. This section defines the adversary, the assumed deployment, the attacks CPHAR helps prevent or detect, and the residual risks operators inherit.

Adversary model

CPHAR considers an adversary who may:

  • Physically access sealed containers between inspection cycles.
  • Compromise some, but not all, operator staff.
  • Operate a custom hardware lab to attempt seal extraction or cloning.
  • Observe network traffic between verifier and seal.
  • Tamper with registry mirrors served by untrusted infrastructure.

CPHAR does not assume the adversary can:

  • Forge the seal vendor's manufacturer attestation chain.
  • Compromise the inspector and the auditor and the operator simultaneously without leaving evidence.
  • Break the cryptographic primitives the seal uses.

These are simplifying assumptions, not facts. Each deployment must verify they hold.

Primary attack surfaces

flowchart LR
  A[Inspector] --> B[Inspection record]
  B --> C[Sealing]
  C --> D[Seal device]
  D -.signs.- E[Verifier]
  D --> F[Registry binding]
  F --> G[Reserve claim]
  G --> E

  style A fill:#fdf1dc,stroke:#b76e00,color:#111827
  style D fill:#e8edff,stroke:#2457ff,color:#111827
  style F fill:#e3f4ec,stroke:#1f8a5b,color:#111827

The three high-impact surfaces are:

  1. Inspection corruption — out of CPHAR's scope cryptographically, but it is the load-bearing assumption everything else rests on.
  2. Seal hardware — extraction, cloning, side-channels, supply-chain.
  3. Registry integrity — wrong bindings, suppressed revocations, snapshot equivocation.

Attacks

ThreatImpactMitigationResidual riskDetection
Inspector colludes with operatorHighIndependent auditor sign-off on inspection; rotate inspectors; sample re-inspectionCollusion involving auditor tooStatistical re-inspection, cross-referenced records
Seal removed and re-attached to substitute containerHighTamper-evident attachment + continuous attestation cadence + custody chainBrief substitution windows during transitHigh-cadence challenges, physical attachment audit
Seal cloned via key extractionHighUse seals with certified tamper response; record firmware measurement at registrationFuture cryptanalytic or hardware advancesCompare attested firmware measurement to registered baseline
Registry binding pointed at wrong lotMediumAppend-only log; require independent co-signature on bindingsQuiet operator-side errorsAuditor inclusion proofs and binding-replay verification
Snapshot equivocation (two distinct snapshots presented to different verifiers)MediumPublish snapshot roots to a transparency log; verifiers cross-checkLocal fork accepted before transparency catches upInclusion proofs against the transparency log
Replay of stale SealAttestationMediumStrict freshness window; nonce uniqueness; domain separationWithin-window replay possibleVerifier-side nonce tracking
Disclosure incompleteness (off-book lots)HighRegulatory disclosure obligations; independent inventory auditOff-book reserves CPHAR cannot seeCross-source inventory comparison

Residual risks

Even with all listed mitigations applied, CPHAR-based deployments retain:

  • Trust in the inspection process at sealing time.
  • Trust in the seal vendor's manufacturing and tamper response.
  • Trust in registry operators' commitment to append-only behavior.
  • Time-bounded gaps between attestation cycles.

CPHAR shrinks the evidence gap between inspections; it does not eliminate it.

Reading the threat-model pages

When this section is expanded with per-attack pages, each will follow the structure:

  • Threat
  • Impact
  • Mitigation
  • Residual risk
  • Detection method

See What CPHAR Does Not Prove for the matching non-goals.