| name |
Valari Web Application Firewall v10.3.11 |
Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software |
| category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
DE |
| status |
archived |
archived |
| not_valid_after |
24.11.2022 |
01.09.2019 |
| not_valid_before |
24.11.2017 |
21.08.2012 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C083-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0791a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Valari_Security_Target_0.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0791b_pdf.pdf |
| manufacturer |
Kaapagam Technologies Sdn. Bhd. |
Infineon Technologies AG |
| manufacturer_web |
https://www.kaapagamtech.com/ |
https://www.infineon.com/ |
| security_level |
EAL2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
572478fcd6b79542 |
8177451d4c2a4e79 |
| heuristics/cert_id |
ISCB-3-RPT-C083-CR-v1 |
BSI-DSZ-CC-0791-2012 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
10.3.11 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0827-2013 |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-1158-V4-2025, BSI-DSZ-CC-1158-V3-2025, BSI-DSZ-CC-0827-V9-2024, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0946-V2-2015, CSEC2014007, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V4-2016, ANSSI-CC-2019/38, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V6-2017 |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2017-009-C083
- certification_date: 24.11.2017
- developer: Kaapagam Technologies Sdn Bhd.
- enhanced:
- assurance_level: EAL2
- category: Boundary Protection Devices and Systems
- cert_id: C083
- certification_date: 24.11.2017
- developer: B15-15, I-SOVO@I-City No. 6, Persiaran Multimedia, Section 7 40000 Shah Alam, Selangor Darul Ehsan URL: Valari Web Application Firewall Email: [email protected] Phone: +603 8992 3172
- expiration_date: 24.11.2022
- mutual_recognition: CCRA
- product: Valari Web Application Firewall v10.3.11
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/ISCB-5-RPT-C083-CR-v1.pdf
- scope: The TOE is designed to secure web applications from the attacks and provide a security layer by proxy-ing all HTTP(S) traffic and shield web servers and databases from direct access of the attackers irrespective of the underlying application vulnerabilities. The TOE primary features include: Identification and Authentication: The TOE enables audit functionality to tracks all activities within the TOE boundary network inclusive of its own operations as TOE Application Server. User Data Protection: The TOE protects the web application from external network intrusions by using information flow control between internal and external network. The TOE will log all HTTP requests and responses before allowing or rejecting the HTTP requests. Security Management: TOE functions can be managed through command-line interface. The TOE only allows limited user access to run a limited set of commands. These do not affect the running mode of the TOE. Security Audit: The TOE will generate audit records for HTTP Request and responses. Each audited events will be recorded along with date and time of event, source IP, account user who performed the event, event name, system filename related to event and other event details.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/Valari_Security_Target_0.5.pdf
- type: Boundary Protection Devices and Systems
- expiration_date: 24.11.2022
- level: EAL2
- product: Valari Web Application Firewall v10.3.11
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/58
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C083-CR-v1.pdf |
0791a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0791-2012
- cert_item: Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-3-RPT-C083-CR-v1: 33
|
- DE:
- BSI-DSZ-CC-0791-2012: 22
- BSI-DSZ-CC-S-0007-: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 5: 8
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 14
- Infineon Technologies: 8
- Infineon Technologies AG: 16
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 2
- physical probing: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 1
- AIS47: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Summary (ETR Summary) for the M9900 A21, version 3, 2012-08-09, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M9900 A21, version 3: 1
- TÜV Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A21, Version 0.2, 2012-04-30, Infineon Technologies AG: 1
- the BSI Website [6] Security Target, M9900 A21, Version 1.1, 2012-07-31, Infineon Technologies AG (confidential document) [7] Security Target Lite, M9900 A21, Version 1.1, 2012-07-31 (sanitised public document) [8: 1
|
| pdf_data/report_metadata |
- /Author: ISCB Department
- /CreationDate: D:20171204082900+00'00'
- /Creator: Microsoft Word
- /Keywords: MyCB_TMP_002
- /ModDate: D:20171204082900+00'00'
- /Subject: Valari Web Application Firewall v10.3.11
- /Title: C083 Certification Report
- pdf_file_size_bytes: 983010
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20120906102435+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon smartcard IC (Security Controller) M7794 A12 with optional RSA2048/4096 v1.02.013, EC v1.02.013 and Toolbox v1.02.013, Infineon Technologies AG"
- /ModDate: D:20120906102946+02'00'
- /Producer: LibreOffice 3.5
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0791-2012
- pdf_file_size_bytes: 1101031
- pdf_hyperlinks: https://www.bsi.bund.dea/, http://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
| pdf_data/st_filename |
Valari_Security_Target_0.5.pdf |
0791b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 3
- EAL5: 6
- EAL5 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.3: 15
- FAU_GEN.3.1: 2
- FAU_GEN.3.2: 2
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 2
- FMT_MSA: 3
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_MSA.5: 12
- FMT_MSA.5.1: 2
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 3
- FPT_STM.2: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.4: 9
- FCS_COP: 12
- FCS_COP.1: 15
- FCS_RNG: 12
- FCS_RNG.1: 27
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 9
- FDP_ITC.2: 9
- FDP_ITT.1: 4
- FDP_SDI.1: 12
- FDP_SDI.1.1: 1
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 5
- FPT_ITT.1: 4
- FPT_PHP.3: 4
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 2
- A.CONFIGRULE: 2
- A.CONN: 2
- A.FLOW: 2
- A.KEY: 2
- A.PHY: 2
- A.TIME: 1
- A.TIMEBACK: 1
- O:
- O.ACCESSLOG: 3
- O.AUDIT: 3
- O.CONFIG: 4
- O.EXPLOIT: 3
- O.NOAUTH: 3
- OE:
- OE.ADMIN: 2
- OE.CONFIGRULE: 2
- OE.CONN: 3
- OE.FLOW: 2
- OE.KEY: 3
- OE.PHY: 2
- OE.TIMEBACK: 2
- T:
- T.ACCESSLOG: 2
- T.AUDIT: 2
- T.CONFIG: 2
- T.EXPLOIT: 2
- T.NOAUTH: 2
- T.REMOTE: 2
|
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies: 2
- Infineon Technologies AG: 19
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 3
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 2
- Side-channel: 1
- Timing Attack: 1
- side channel: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- ISO:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: AD
- /CreationDate: D:20171102074055Z00'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171102074055Z00'00'
- /Producer: Mac OS X 10.11.4 Quartz PDFContext
- /Subject: Valari Security Target
- pdf_file_size_bytes: 525664
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author: Jürgen Noller
- /CreationDate: D:20120802163846+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Infineon, Common Criteria, Security Controller, EAL5, +, high, TrippleDES, AES, RSA, Elliptic Curve, PP0035, SLE
- /ModDate: D:20120907135443+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Security Target Lite
- pdf_file_size_bytes: 656253
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |