{"_id": "b7f131020fc0cf4f", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "b7f131020fc0cf4f", "status": "archived", "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems", "name": "Sm@rtCafe Expert Version 5.0", "manufacturer": "G+D Mobile Security GmbH", "scheme": "DE", "security_level": {"_type": "Set", "elements": ["EAL4+"]}, "not_valid_before": "2009-12-17", "not_valid_after": "2019-09-01", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0537a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0537b_pdf.pdf", "cert_link": null, "manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/", "protection_profile_links": {"_type": "Set", "elements": []}, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "ff28a8aa87558aa3d4b92d8156a53d0441ed733de8f30244cc34b9c6a6e3f80f", "txt_hash": "b62fff87a932f46a7be46ce2991d96e93b9aa83d3288caa5b29f9ce8577ea551", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "20abe1238194eeac1de616ce74550d24b8cb9fd9a455511e34ba52c7a4fae0f8", "txt_hash": "9fce462a012153236228285802669692312a2af43eaecf1c2dfbc6c2c9eccf69", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null, "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 1096697, "pdf_is_encrypted": false, "pdf_number_of_pages": 36, "/CreationDate": "D:20100111131526+01'00'", "/Subject": "Common Criteria Certification", "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "/Creator": "Writer", "/Keywords": "Sm@rtCafe ExpertVersion 5.0, Giesecke & Devrient GmbH, Java Card, Common Criteria, Certification, Zertifzierung", "/Producer": "StarOffice 9", "/ModDate": "D:20100111135143+01'00'", "/Title": "Certification Report BSI-DSZ-CC-0537-2009", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://www.bsi.bund.de/", "http://de.wikipedia.org/wiki/Electrically_Erasable_Programmable_Read_Only_Memory"]}}, "st_metadata": {"pdf_file_size_bytes": 2381740, "pdf_is_encrypted": true, "pdf_number_of_pages": 178, "/Author": "G&D/CSRD22", "/Comments": "Open", "/Company": "GuD", "/CreationDate": "D:20091027093026+01'00'", "/Creator": "Acrobat PDFMaker 7.0 f\u00fcr Word", "/Keywords": "Version 1.0 / Status 27.10.2009, Java Card, Standard 2.2 configuration, SUN Java Card System PP, Global Platform 2.1.1 Card Implementation, NXP P5CD040/080/144", "/ModDate": "D:20091027105141+01'00'", "/Producer": "Acrobat Distiller 7.0 (Windows)", "/SourceModified": "D:20091027082407", "/Subject": "Security Target Lite SmartCafe Expert V5.0", "/Title": "Security Target Lite SmartCafe Expert V5.0", "pdf_hyperlinks": {"_type": "Set", "elements": []}}, "cert_metadata": null, "report_frontpage": {"DE": {"match_rules": ["(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"], "cert_id": "BSI-DSZ-CC-0537-2009", "cert_item": "Sm@rtCafe Expert Version 5.0", "developer": "Giesecke & Devrient GmbH", "cert_lab": "BSI"}}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-0537-2009": 19, "BSI-DSZ-CC-0404-2007": 3, "BSI-DSZ-CC-0410-2007": 3, "BSI-DSZ-CC-0411-2007": 3, "BSI-DSZ-CC-0537": 3, "BSI-DSZ-CC-0404": 1, "BSI-DSZ-CC-0410": 1, "BSI-DSZ-CC-0411": 1}}, "cc_protection_profile_id": {}, "cc_security_level": {"EAL": {"EAL 4": 9, "EAL4": 7, "EAL 1": 1, "EAL 7": 1, "EAL5+": 1, "EAL1": 5, "EAL3": 4, "EAL5": 6, "EAL7": 4, "EAL2": 3, "EAL6": 3, "EAL 4 augmented": 3}}, "cc_sar": {"ACM": {"ACM_AUT": 2, "ACM_CAP": 2, "ACM_SCP": 2, "ACM_AUT.1": 1, "ACM_CAP.4": 1, "ACM_SCP.2": 1}, "ADO": {"ADO_DEL": 2, "ADO_IGS": 2, "ADO_DEL.2": 1, "ADO_IGS.1": 1}, "ADV": {"ADV_IMP.2": 5, "ADV_FSP": 2, "ADV_HLD": 2, "ADV_IMP": 2, "ADV_INT": 2, "ADV_LLD": 2, "ADV_RCR": 2, "ADV_SPM": 2}, "AGD": {"AGD_ADM": 2, "AGD_USR": 2}, "ALC": {"ALC_DVS": 2, "ALC_FLR": 2, "ALC_LCD": 1, "ALC_TAT": 2, "ALC_DVS.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1}, "ATE": {"ATE_FUN": 4, "ATE_IND": 4, "ATE_COV": 2, "ATE_DPT": 2}, "AVA": {"AVA_VLA.4": 6, "AVA_VLA": 5, "AVA_CCA": 2, "AVA_MSU": 2, "AVA_SOF": 3, "AVA_VLA.2": 1, "AVA_VLA.3": 1}, "APE": {"APE_DES": 1, "APE_ENV": 1, "APE_INT": 1, "APE_OBJ": 1, "APE_REQ": 1, "APE_SRE": 1}, "ASE": {"ASE_DES": 1, "ASE_ENV": 1, "ASE_INT": 1, "ASE_OBJ": 1, "ASE_PPC": 1, "ASE_REQ": 1, "ASE_SRE": 1, "ASE_TSS": 1}}, "cc_sfr": {}, "cc_claims": {"OE": {"OE.NATIVE": 1, "OE.APPLET": 1, "OE.VERIFICATION": 1}}, "vendor": {"NXP": {"NXP": 11}, "GD": {"Giesecke & Devrient": 10}}, "eval_facility": {"TUV": {"T\u00dcV Informationstechnik": 2}}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 2}}, "DES": {"DES": {"DES": 2}, "3DES": {"3-DES": 1, "3DES": 1}}}, "asymmetric_crypto": {"RSA": {"RSA 1024": 1}}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"other": {"JIL": 4}}, "technical_report_id": {"BSI": {"BSI 7125": 2, "BSI 7148": 1, "BSI 7149": 1}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {"ICFab": {"IC Fabricator": 2}, "ICType": {"IC Type": 2}}, "ic_data_group": {}, "standard_id": {"BSI": {"AIS 34": 3, "AIS 20": 3, "AIS 25": 2, "AIS 26": 2, "AIS 36": 2, "AIS 37": 1, "AIS20": 1, "AIS 35": 2, "AIS 32": 1, "AIS36": 3}, "ISO": {"ISO/IEC 15408:2005": 3}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"OutOfScope": {"out of scope": 3, "the Smart Card at the initialisation site. The initialisation and the personalisation process are out of scope of this evaluation. 13 / 36 Certification Report BSI-DSZ-CC-0537-2009 The hardware product can be": 1, "contained in one or more Java packages. Note, that applets are not part of the TOE and therefore out of scope. The hardware platform was always the NXP P5CD144V0B. \u25cf an emulator which is required for test": 1, "are tested through Module Tests. As the initialisation and the personalisation process are out of scope of this evaluation, the TOE was always tested in its usage phase. 16 / 36 BSI-DSZ-CC-0537-2009": 1}, "ConfidentialDocument": {"Version 3.0, Status 27.08.2009, Security Target SmartCafe Expert V5.0, Giesecke & Devrient (confidential document) 8 specifically \u2022 AIS 20, Version 1, 2 December 1999, Funktionalit\u00e4tsklassen und": 1, "7] Evaluation Technical Report, Version 2, Date: 2009-10-14, BSI-DSZ-CC-0537, TUVIT (confidential document) [8] Configuration list for the TOE, Version 1.4, Date: 2009-08-27, Giesecke & Devrient": 1}}}, "st_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-0404-2007": 2, "BSI-DSZ-CC-0410-2007": 2, "BSI-DSZ-CC-0411-2007": 2, "BSI-DSZ-CC-0404": 1}}, "cc_protection_profile_id": {"BSI": {"BSI-PP-0026": 3, "BSI-PP-0002": 1}}, "cc_security_level": {"EAL": {"EAL4": 8, "EAL 4": 2, "EAL 5": 3, "EAL4 augmented": 2, "EAL 4 augmented": 1, "EAL 5 augmented": 1}}, "cc_sar": {"ACM": {"ACM_AUT": 2, "ACM_AUT.1": 11, "ACM_CAP": 2, "ACM_CAP.4": 22, "ACM_SCP": 3, "ACM_SCP.2": 8, "ACM_CAP.3": 3}, "ADO": {"ADO_DEL": 2, "ADO_DEL.2": 10, "ADO_IGS.1": 10, "ADO_IGS": 1}, "ADV": {"ADV_IMP.2": 22, "ADV_FSP": 2, "ADV_FSP.2": 20, "ADV_HLD": 2, "ADV_HLD.2": 22, "ADV_IMP": 1, "ADV_LLD": 2, "ADV_LLD.1": 21, "ADV_RCR": 2, "ADV_RCR.1": 15, "ADV_SPM": 2, "ADV_SPM.1": 31, "ADV_FSP.1": 10, "ADV_IMP.1": 3, "ADV_HLD.1": 2}, "AGD": {"AGD_ADM": 2, "AGD_ADM.1": 26, "AGD_USR": 2, "AGD_USR.1": 19}, "ALC": {"ALC_DVS": 2, "ALC_DVS.1": 11, "ALC_LCD": 2, "ALC_LCD.1": 9, "ALC_TAT": 2, "ALC_TAT.1": 13, "ALC_DVS.2": 1}, "ATE": {"ATE_COV": 2, "ATE_COV.2": 8, "ATE_DPT": 2, "ATE_DPT.1": 6, "ATE_FUN": 2, "ATE_FUN.1": 17, "ATE_IND": 1, "ATE_IND.2": 9}, "AVA": {"AVA_VLA.4": 28, "AVA_MSU": 2, "AVA_MSU.2": 15, "AVA_VLA": 1, "AVA_SOF": 2, "AVA_SOF.1": 9, "AVA_VLA.3": 1, "AVA_VLA.2": 1, "AVA_MSU.3": 1}}, "cc_sfr": {"FAU": {"FAU_ARP": 7, "FAU_ARP.1": 11, "FAU_SAA.1": 3}, "FCO": {"FCO_NRO.2": 9, "FCO_NRO": 1}, "FCS": {"FCS_RND": 7, "FCS_RND.1": 14, "FCS_CKM.1": 15, "FCS_CKM.1.1": 2, "FCS_CKM.2": 6, "FCS_CKM.2.1": 2, "FCS_CKM.3": 5, "FCS_CKM.3.1": 2, "FCS_CKM.4": 13, "FCS_CKM.4.1": 2, "FCS_COP.1": 16, "FCS_COP.1.1": 4, "FCS_RND.1.1": 6}, "FDP": {"FDP_IFC": 23, "FDP_IFC.1": 28, "FDP_IFF": 13, "FDP_IFF.1": 50, "FDP_RIP": 43, "FDP_RIP.1": 34, "FDP_ROL.1": 15, "FDP_ROL": 4, "FDP_SDI.2": 6, "FDP_SDI.2.1": 2, "FDP_SDI.2.2": 2, "FDP_ACF.1": 51, "FDP_ITC.2": 25, "FDP_ACC": 20, "FDP_ACC.2": 19, "FDP_ROL.1.1": 2, "FDP_IFC.2": 11, "FDP_UIT.1": 6, "FDP_ACC.1": 22, "FDP_IFF.2": 10, "FDP_IFF.2.7": 1, "FDP_ACF": 15, "FDP_ITC.1": 4, "FDP_UIT": 1, "FDP_ITT.1": 3}, "FIA": {"FIA_ATD": 3, "FIA_ATD.1": 7, "FIA_UID": 13, "FIA_UID.2": 4, "FIA_USB.1": 7, "FIA_USB.1.1": 3, "FIA_USB.1.2": 3, "FIA_USB.1.3": 3, "FIA_UID.1": 25, "FIA_SOS.2": 1}, "FMT": {"FMT_LIM": 6, "FMT_LIM.1": 20, "FMT_LIM.2": 13, "FMT_SMF.1": 28, "FMT_MSA": 49, "FMT_MSA.2": 16, "FMT_MSA.3": 45, "FMT_SMR": 34, "FMT_SMR.1": 63, "FMT_MTD": 3, "FMT_MTD.1": 8, "FMT_MTD.3": 5, "FMT_MTD.3.1": 2, "FMT_MSA.1": 41, "FMT_REV.1": 8, "FMT_LIM.1.1": 3, "FMT_LIM.2.1": 2, "FMT_REV": 1}, "FPR": {"FPR_UNO.1": 7, "FPR_UNO.1.1": 2}, "FPT": {"FPT_SEP.1": 13, "FPT_SEP.1.1": 2, "FPT_SEP.1.2": 2, "FPT_RCV.3": 34, "FPT_RVM.1": 15, "FPT_RVM.1.1": 2, "FPT_TDC.1": 6, "FPT_TDC.1.1": 2, "FPT_TDC.1.2": 3, "FPT_FLS": 14, "FPT_FLS.1": 27, "FPT_TST.1": 11, "FPT_TST.1.1": 2, "FPT_TST.1.2": 3, "FPT_TST.1.3": 2, "FPT_AMT.1": 11, "FPT_PHP.3": 10, "FPT_RCV.4": 7, "FPT_AMT": 4, "FPT_PHP": 3, "FPT_SEP": 3, "FPT_RCV": 9, "FPT_RVM": 3, "FPT_RND.1": 1, "FPT_ITT.1": 3, "FPT_TST": 1}, "FRU": {"FRU_RSA.1": 8, "FRU_FLT.1": 6, "FRU_FLT": 3, "FRU_RSA": 2, "FRU_FLT.2": 5}, "FTP": {"FTP_ITC.1": 11, "FTP_TRP.1": 2, "FTP_ITC": 3}}, "cc_claims": {"D": {"D.APP_CODE": 7, "D.APP_C_DATA": 3, "D.APP_I_DATA": 5, "D.PIN": 6, "D.APP_": 1, "D.JCS_CODE": 3, "D.JCS_": 1, "D.SEC_DATA": 7, "D.API_DATA": 3, "D.CRYPTO": 6, "D.JCS_DATA": 4}, "O": {"O.SID": 14, "O.OPERATE": 13, "O.RESOURCES": 9, "O.FIREWALL": 15, "O.NATIVE": 10, "O.REALLOCATION": 6, "O.SHRD_VAR_CONFID": 5, "O.SHRD_VAR_INTEG": 5, "O.ALARM": 11, "O.TRANSACTION": 8, "O.CIPHER": 11, "O.PIN-MNGT": 8, "O.KEY-MNGT": 8, "O.INSTALL": 13, "O.LOAD": 8, "O.DELETION": 7, "O.OBJ-DELETION": 4, "O.REMOTE": 7, "O.SCP": 53, "O.CARD-MANAGEMENT": 7, "O.RND": 11, "O.SIDE_CHANNEL": 9, "O.CHECK_INIT": 6, "O.JAVAOBJECT": 24, "O.APPLET": 29, "O.CODE_PKG": 7, "O.CODE_PCKG": 8, "O.REMOTE_OBJ": 8, "O.REMOTE_MTHD": 5, "O.ROR": 5, "O.RMI_SERVICE": 13, "O.REMOTE_OBJECT": 1, "O.PACKAGE": 6, "O.CARD_MANAGEMENT": 7, "O.CARD-": 7, "O.REALLOCATIO": 1, "O.SHRD_VAR_IN": 1, "O.SHRD_VAR_CO": 2, "O.SHRD_VAR_CONF": 1, "O.XYZ": 1, "O.PIN-": 2, "O.REALLO": 1, "O.LOA": 1, "O.SHRD_VAR": 1, "O.KEY_MNGT": 1}, "T": {"T.PHYSICAL": 7, "T.CONFID-JCS-CODE": 3, "T.CONFID-APPLI-DATA": 3, "T.CONFID-JCS-DATA": 3, "T.INTEG-APPLI-CODE": 8, "T.INTEG-JCS-CODE": 3, "T.INTEG-APPLI-DATA": 8, "T.INTEG-JCS-DATA": 3, "T.SID": 14, "T.EXE-CODE": 7, "T.NATIVE": 4, "T.RESOURCES": 3, "T.INSTALL": 5, "T.EXE-CODE-REMOTE": 3, "T.DELETION": 5, "T.OBJ-DELETION": 3, "T.RND": 11, "T.LEAKAGE": 7, "T.CHIP": 4, "T.CONF": 1, "T.INTEG-": 4, "T.INTEG": 1, "T.PHYSI": 1, "T.CONFID-": 2, "T.CONFID-JCS-": 1, "T.INTEG-JCS-": 4, "T.EXE-": 5, "T.INTEG-APPLI-": 2, "T.NATIV": 1, "T.RESOURC": 1, "T.OBJ-": 1, "T.A": 1}, "A": {"A.NATIVE": 9, "A.VERIFICATION": 5, "A.APPLET": 5, "A.VERIFICA": 1}, "R": {"R.JAVA": 15, "R.CMRG": 4}, "OP": {"OP.PUT": 5, "OP.CREATE": 3, "OP.JAVA": 2, "OP.DELETE_APPLET": 3, "OP.DELETE_PCKG": 2, "OP.DELETE_PCKG_APPLET": 2, "OP.GET_ROR": 2, "OP.INVOKE": 2, "OP.RET_RORD": 3, "OP.INVK_INTERFACE": 1, "OP.SEND": 1, "OP.RECEIVE": 1, "OP.PACKAGE_LOADING": 5, "OP.APPLET_INSTALLATION": 5, "OP.APPLET_DELETION": 5, "OP.PACKAGE_DELETION": 5, "OP.BYTECODE": 1}, "OE": {"OE.NATIVE": 9, "OE.APPLET": 9, "OE.VERIFICATION": 22, "OE.VERIFICAT": 1, "OE.XYZ": 1}, "OSP": {"OSP.VERIFICATION": 3}}, "vendor": {"NXP": {"NXP": 14, "NXP Semiconductors": 3}, "GD": {"Giesecke & Devrient": 8}}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 16, "AES-": 1}}, "DES": {"DES": {"DES": 9}, "3DES": {"3-DES": 5, "Triple-DES": 1}}}, "asymmetric_crypto": {"FF": {"DSA": {"DSA": 1}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA2": {"SHA256": 1}}}, "crypto_scheme": {"MAC": {"MAC": 1}}, "crypto_protocol": {}, "randomness": {"TRNG": {"TRNG": 3}, "RNG": {"RND": 22}}, "cipher_mode": {"ECB": {"ECB": 2}, "CBC": {"CBC": 1}}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"Leak-Inherent": 6, "physical probing": 1, "side-channel": 1, "side channel": 1, "DPA": 3, "SPA": 2, "timing attack": 1, "timing attacks": 1}, "FI": {"physical tampering": 1, "malfunction": 2, "Malfunction": 6, "DFA": 2}, "other": {"Reverse Engineering": 1}}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 46-3": 1, "FIPS PUB 197": 1}, "PKCS": {"PKCS1": 2}, "BSI": {"AIS 20": 2, "AIS20": 3, "AIS31": 2, "AIS 31": 1}, "RFC": {"RFC 3447": 1}, "ISO": {"ISO/IEC 7816-3": 1, "ISO/IEC 7816-5": 1}, "ICAO": {"ICAO": 3}, "CC": {"CCIMB-2005-08-001": 1, "CCIMB-2005-08-002": 1, "CCIMB-2005-08-003": 1, "CCMB-2005-08-004": 1}}, "javacard_version": {"JavaCard": {"Java Card 2.2.2": 3, "Java Card 2.2": 1}, "GlobalPlatform": {"GlobalPlatform 2.1.1": 4}}, "javacard_api_const": {}, "javacard_packages": {"java": {"java.lang": 1, "java.rmi": 2}, "javacard": {"javacard.security": 2, "javacard.framework.service": 1, "javacard.framework": 5, "javacard.framework.applet": 1}, "javacardx": {"javacardx.crypto": 2, "javacardx.rmi": 1, "javacardx.security": 1}}, "certification_process": {"OutOfScope": {"out of scope": 2, "the Smart Card at the initialisation site. The initialisation and the personalisation process are out of scope of this evaluation. The TOE\u2019s delivery scope beside the initialisation file and the mask keys": 1, "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this ST, though. 8.1.1.14 T.PHYSICAL Covered by O.SCP.IC. Physical protections rely on the SCP": 1}}}, "cert_keywords": null, "report_filename": "0537a_pdf.pdf", "st_filename": "0537b_pdf.pdf", "cert_filename": null}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["5.0"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": ["BSI"], "cert_id": "BSI-DSZ-CC-0537-2009", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0411-2007", "BSI-DSZ-CC-0410-2007", "BSI-DSZ-CC-0404-2007"]}, "indirectly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0404-2007", "BSI-DSZ-CC-0410-2007", "BSI-DSZ-CC-0411-2007"]}}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0404-2007", "BSI-DSZ-CC-0410-2007", "BSI-DSZ-CC-0411-2007"]}, "indirectly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0404-2007", "BSI-DSZ-CC-0410-2007", "BSI-DSZ-CC-0411-2007"]}}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VLA", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_SPM", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_LLD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_HLD", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_ADM", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_SOF", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_MSU", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_USR", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_RCR", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null, "protection_profiles": null, "eal": "EAL4+"}}