Threats and Attack Classes Spoofing Connection hijacking Unauthorized STag use Tampering Unauthorized modification of remote buffers Information Disclosure Unauthorized read access to remote buffers Denial of Service Consumption of “precious” resources Elevation of Privilege Loading FW onto the RNIC |