This page was not yet optimized for use on mobile
devices.
SECIRON – Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0
CSV information
| Status | active |
|---|---|
| Valid from | 06.02.2024 |
| Valid until | 06.02.2029 |
| Scheme | 🇲🇾 MY |
| Manufacturer | SecIron (Malaysia) Sdn. Bhd. |
| Category | Mobility |
| Security level | EAL2 |
Heuristics summary
Certificate ID: ISCB-3-RPT-C129-CR-v1a
Certificate
Extracted keywords
Security level
EAL2File metadata
| Title | ISCB-5-CERT-C129-CERTIFICATE-v1 |
|---|---|
| Creation date | D:20240222045557Z00'00' |
| Modification date | D:20240222045557Z00'00' |
| Pages | 1 |
| Creator | Word |
| Producer | macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext |
Certification report
Extracted keywords
Security level
EAL2, EAL 2Claims
A.USER, A.DATAFLOWCertificates
ISCB-5-RPT-C129-CR-v1aSide-channel analysis
reverse engineeringStandards
ISO/IEC15408, ISO/IEC 18045File metadata
| Title | ISCB-3-RPT-C129-CR-v1a |
|---|---|
| Creation date | D:20240222044408Z00'00' |
| Modification date | D:20240222044408Z00'00' |
| Pages | 31 |
| Creator | Word |
| Producer | macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext |
Security target
security target file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-3-RPT-C129-CR-v1aScheme data
| Cert No | 2024-001-C129 | |
|---|---|---|
| Developer | SecIron (Malaysia) Sdn. Bhd. (201801025495 (1287515-T)) | |
| Level | EAL2 | |
| Product | SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 | |
| Certification Date | 06.02.2024 | |
| Expiration Date | 06.02.2029 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/169 | |
| Enhanced | ||
| Developer | Unit 704, Uptown One, No. 1, Jalan SS21/58, Damansara Uptown, 47400 Petaling Jaya, SelangorE-mail: [email protected]: +601133503181Website: https://www.seciron.com | |
| Status | Valid | |
| Scope | Android Mobile Application Hardening Sandbox Module is a product designed by SECIRON and developed as part of IronWALL. IronWALL is designed to safeguard against a wide range of threats, including mobile application tampering, reverse engineering, debugging, jailbreaks, application cloning, malware, repackaging and other attacks on untrusted environment. The integrated security guarantee service effectively prevents malicious attacks against mobile applications such as de-compilation, repackaging, memory injection, dynamic debugging, data theft, transaction hijacking, and application phishing, and comprehensively protects application software security. | |
| Cert Id | C129 | |
| Category | Other Devices and Systems | |
| Assurance Level | EAL2 | |
| Product | SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 | |
| Certification Date | 06.02.2024 | |
| Expiration Date | 06.02.2029 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/SECIRON__Android_Mobile_Application_Hardening_Sandbox_Module_AMAHSM_version_7.0-Security_Target-1.0.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/ISCB-3-RPT-C129-CR-v1a.pdf | |
| Type | Mobility | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Mobility",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C129-CERTIFICATE-v1.pdf",
"dgst": "17bfc3f4edcb545c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C129-CR-v1a",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"7.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2024-001-C129",
"certification_date": "2024-02-06",
"developer": "SecIron (Malaysia) Sdn. Bhd. (201801025495 (1287515-T))",
"enhanced": {
"assurance_level": "EAL2",
"category": "Other Devices and Systems",
"cert_id": "C129",
"certification_date": "2024-02-06",
"developer": "Unit 704, Uptown One, No. 1, Jalan SS21/58, Damansara Uptown, 47400 Petaling Jaya, SelangorE-mail: [email protected]: +601133503181Website: https://www.seciron.com",
"expiration_date": "2029-02-06",
"mutual_recognition": "CCRA",
"product": "SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/ISCB-3-RPT-C129-CR-v1a.pdf",
"scope": "Android Mobile Application Hardening Sandbox Module is a product designed by SECIRON and developed as part of IronWALL. IronWALL is designed to safeguard against a wide range of threats, including mobile application tampering, reverse engineering, debugging, jailbreaks, application cloning, malware, repackaging and other attacks on untrusted environment. The integrated security guarantee service effectively prevents malicious attacks against mobile applications such as de-compilation, repackaging, memory injection, dynamic debugging, data theft, transaction hijacking, and application phishing, and comprehensively protects application software security.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/SECIRON__Android_Mobile_Application_Hardening_Sandbox_Module_AMAHSM_version_7.0-Security_Target-1.0.pdf",
"type": "Mobility"
},
"expiration_date": "2029-02-06",
"level": "EAL2",
"product": "SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/169"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SecIron (Malaysia) Sdn. Bhd.",
"manufacturer_web": "https://www.seciron.com",
"name": "SECIRON \u2013 Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0",
"not_valid_after": "2029-02-06",
"not_valid_before": "2024-02-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C129-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240222045557Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20240222045557Z00\u002700\u0027",
"/Producer": "macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext",
"/Title": "ISCB-5-CERT-C129-CERTIFICATE-v1",
"pdf_file_size_bytes": 829372,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-3-RPT-C129-CR-v1a.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C129-CR-v1a": 30
}
},
"cc_claims": {
"A": {
"A.DATAFLOW": 1,
"A.USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240222044408Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20240222044408Z00\u002700\u0027",
"/Producer": "macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext",
"/Title": "ISCB-3-RPT-C129-CR-v1a",
"pdf_file_size_bytes": 1100872,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
},
"st_filename": null,
"st_frontpage": null,
"st_keywords": null,
"st_metadata": null
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C129-CR-v1a.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SECIRON%20\u2013%20Android%20Mobile%20Application%20Hardening%20Sandbox%20Module%20(AMAHSM)%20version%207.0-Security%20Target-1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f66134024a62dde37b914bdfe124d08a534857f9a615be169013146803d57de7",
"txt_hash": "825cf90ad78ac9f9a0a07b05f5fb1b27e5f63f5e47b009d661e7517bed2ba115"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "9d74a47e731deeb7f628ff3b05ba7c13b0651d75cdbb6d8c6f4490ddd417a82c",
"txt_hash": "0c219e4dad5e4b30f9c15d3c41b25dbda1e4ebebc5c02f90ff6161e8a98235eb"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
}
},
"status": "active"
}