name |
EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™ |
Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèqueWear Levelling version 06.03.02.02 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
archived |
archived |
not_valid_after |
15.05.2017 |
06.04.2025 |
not_valid_before |
30.05.2011 |
29.01.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_02-s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_02fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_02en.pdf |
manufacturer |
EMC Corporation |
Wisekey |
manufacturer_web |
https://www.emc.com/ |
https://www.wisekey.com |
security_level |
EAL3+, ALC_FLR.2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
5c135ac1bf057d70 |
ff1e497a4f732f43 |
heuristics/cert_id |
383-4-172 |
ANSSI-CC-2018/02 |
heuristics/cert_lab |
CANADA |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
7.0, 5.31 |
06.04.01.07, 06.03.02.02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2020/20 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/16 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/20 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/16 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
certificat-anssi-cc-2018_02-s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: jchuzel
- /CreationDate: D:20220906094656+02'00'
- /ModDate: D:20220906094656+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - PS-certificat-ANSSI-CC-2018_02-S01
- pdf_file_size_bytes: 1258024
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
emc-vnx-v531-cert-eng.pdf |
anssi-cc-2018_02fr.pdf |
pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 383-4-172-CR
- cert_lab: CANADA
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/02
- cert_item: Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02
- cert_item_version: Part number 0x44, hardware revision E, Toolbox Library version 0x06040107, Wear Levelling Library version 0x06030202
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France. Commanditaire Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014, le 19 février 2014 avec conformité au “ Package 1 : Loader dedicated for usage by authorized users only
- CA:
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-172: 1
- 383-4-172-CR: 1
|
- FR:
- ANSSI-CC-2016/16: 3
- ANSSI-CC-2018/02: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: TBD
- /CR_Version: 1.0
- /Client City: Hopkinton
- /Client Country: USA
- /Client Full Name: EMC Corporation
- /Client Postal Code: 01748
- /Client Short Name: EMC
- /Client State: MA
- /Client Street: 171 South Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Hewlett-Packard
- /CreationDate: D:20110708105045-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: EMC Corporation
- /Developer Short Name: EMC
- /EAL Level: 3+
- /EAL Level Base: 3
- /EAL Level Text: 3 augmented
- /EAL Long: EAL 3 Augmented
- /EAL Short: EAL 3+
- /ER Document Date: 15 September 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1683-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 1.0
- /ETPlan_date: 7 April 2011
- /ETProcRes_Date: 7 April 2011
- /ETProcRes_Doc#: 1683-000-D004
- /ETProcRes_Title: Evaluation Test Procedures and Test results
- /ETProcRes_Version: 1.0
- /ETProc_Date: 7 April 2011
- /ETProc_Doc#: 1683-000-D004
- /ETProc_Title: Evaluation Test Procedures and Test results
- /ETProc_Version: 1.0
- /ETReport_Date: 30 May 2011
- /ETReport_Doc#: 1683-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 1.2
- /EWP_Date: 12 November 2010
- /EWP_Doc#: 1683-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-172
- /Eval_End_Date: 1 July 2011
- /Eval_Start_Date: 2 August 2010
- /Keywords:
- /LeadEvaluator: Greg Lague
- /LeadEvaluatorInitials: GL
- /ModDate: D:20110708105130-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1683
- /ST_Date: 27 May 2011
- /ST_Title: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
- /ST_Version: 0.8
- /SVC_Date: 9 December 2009
- /SVC_Doc#: 1683-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: 7 April 2011
- /SVR_Doc#: 1683-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Hopkinton, MA
- /Security Classification: EWA-Canada & EMC Proprietary
- /SourceModified: D:20110708141631
- /Sponsor: EMC
- /Sponsor City: Hopkinton
- /Sponsor Country: USA
- /Sponsor Postal Code: 01748
- /Sponsor State: MA
- /Sponsor Street: 171 South Street
- /Subject:
- /TOE: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
- /TOE Short: EMC® VNX OE
- /TOE Short with version: EMC® VNX OE
- /TOE Short-NoTM: EMC® VNX OE
- /TOE Version: Block v5.31 and File v7.0
- /TOE with version: EMC® VNX OE for Block v5.31 and File v7.0 with Unisphere™ running on VNX Series Hardware
- /TOE-NoTM: EMC VNX OE for Block v5.31 and File v7.0 with Unisphere running on VNX Series Hardware
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 89946
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
|
pdf_data/st_filename |
emc-vnx-v531-sec-eng.pdf |
anssi-cible-cc-2018_02en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 4
|
- EAL:
- EAL4: 2
- EAL4+: 1
- EAL5: 9
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 2
- FDP_ACF: 17
- FDP_ACF.1: 8
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 32
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_SAS: 1
- FAU_SAS.1: 13
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.4: 12
- FCS_COP: 17
- FCS_COP.1: 15
- FCS_COP.1.1: 13
- FCS_RNG.1: 19
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 22
- FDP_ITT.1.1: 1
- FDP_SDC: 1
- FDP_SDC.1: 11
- FDP_SDC.1.1: 1
- FDP_SDI.1: 3
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_API: 1
- FIA_API.1: 11
- FIA_API.1.1: 1
- FMT:
- FMT_LIM: 17
- FMT_LIM.1: 28
- FMT_LIM.1.1: 1
- FMT_LIM.2: 29
- FMT_LIM.2.1: 1
- FPT:
- FPT_FLS.1: 24
- FPT_FLS.1.1: 1
- FPT_ITT.1: 20
- FPT_ITT.1.1: 1
- FPT_PHP.3: 25
- FPT_PHP.3.1: 1
- FPT_SDI.2: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 20
- FRU_FLT.2.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.PROTECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 23
- O.AUDIT: 4
- O.AUDIT_REVIEW: 4
- O.BYPASS: 7
- O.PROTECT: 16
- OE:
- OE.PROPER_NAME_ASSIGNME: 2
- OE.PROPER_NAME_ASSIGNMEN: 1
- OE.SECURE_COMMUNICATIO: 6
- OE.SECURE_COMMUNICATION: 1
- OE.SECURE_SERVERS: 7
- OE.TIME: 3
- T:
- T.DATA_CORRUPTION: 2
- T.IMPROPER_CONFIG: 2
- T.IMPROPER_SERVER: 2
- T.MEDIATE_ACCESS: 2
- T.UNAUTH: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- Malfunction: 19
- malfunction: 8
- physical tampering: 2
- SCA:
- Leak-Inherent: 14
- Physical Probing: 1
- Physical probing: 1
- physical probing: 4
- side channel: 2
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 180-4: 5
- FIPS 186-4: 4
- FIPS 197: 1
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 2
- SP 800-38A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Greg Milliken
- /CreationDate: D:20110527131502Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110621111006-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
- /Title: Security Target
- pdf_file_size_bytes: 887892
- pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |