| name |
L4Re Secure Separation Kernel CC Version 1.0.1 |
Philips P5CC036VOM Secure Smart Card Controller |
| category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
DE |
| status |
active |
archived |
| not_valid_after |
18.02.2030 |
01.09.2019 |
| not_valid_before |
18.02.2025 |
08.09.2004 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1177c_pdf.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1177a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0232a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1177b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0232b.pdf |
| manufacturer |
Kernkonzept GmbH |
Philips Semiconductors GmbH |
| manufacturer_web |
https://kernkonzept.com |
https://www.philips.com/ |
| security_level |
EAL4+, ALC_FLR.3 |
EAL5+, AVA_VLA.4, AVA_MSU.3, ALC_DVS.2 |
| dgst |
7929b54ea442ff99 |
c97b7fd8aaa8cbaf |
| heuristics/cert_id |
BSI-DSZ-CC-1177-2025 |
BSI-DSZ-CC-0232-2004 |
| heuristics/cert_lab |
BSI |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
ADV_INT.1, ATE_FUN.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ADV_RCR.2, ATE_IND.2, AGD_USR.1, ASE_REQ.1, ADV_HLD.3, ADV_FSP.3, ASE_SRE.1, ALC_DVS.2, ATE_DPT.2, AVA_VLA.4, ATE_COV.2, AVA_MSU.3, ASE_PPC.1, ALC_LCD.2, ADV_SPM.3, ASE_DES.1, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ALC_TAT.2, AVA_CCA.1 |
| heuristics/extracted_versions |
1.0.1 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0244-2004, BSI-DSZ-CC-0220-2004 |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0244-2004, BSI-DSZ-CC-0346-2006, BSI-DSZ-CC-0220-2004, BSI-DSZ-CC-0311-2005, BSI-DSZ-CC-0347-2006 |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Operating systems
- cert_id: BSI-DSZ-CC-1177-2025
- certification_date: 18.02.2025
- enhanced:
- applicant: Kernkonzept GmbH Buchenstraße 16 b 01097 Dresden Deutschland
- assurance_level: EAL4+,ALC_FLR.3
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1177c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 18.02.2025
- description: The TOE is the L4Re Secure Separation Kernel CC 1.0.1 (L4Re SSK). L4Re SSK is a distribution of the open-source L4Re Operating System Framework. As such it is based on the L4Re Microkernel. The L4Re Microkernel is a 3rd-generation microkernel with a state-of-the-art capability-based mandatory access control security model. It allows the separation of applications into different security domains, information flow control, and, subject to access control, dynamic assignment of resources and communication channels. Further the L4Re Microkernel supports static workloads alongside dynamic workloads, which allows to start, restart and shutdown applications during runtime. L4Re SSK is configured to act as a separation kernel, to provide the security features claimed by the ST. The TOE supports native applications as well as virtual machines (VMs). Access to every resource including but not limited to memory, hardware devices and CPU cores is protected by capabilities. Applications and VMs can only access a resource if they possess a capability with suitable permissions for that resource.
- evaluation_facility: atsec information security GmbH
- expiration_date: 17.02.2030
- product: L4Re Secure Separation Kernel CC, Version 1.0.1
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1177a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1177b_pdf.pdf?__blob=publicationFile&v=2
- product: L4Re Secure Separation Kernel CC, Version 1.0.1
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1177.html
- vendor: Kernkonzept GmbH
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
1177c_pdf.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Kernkonzept, Mikrokernel L4Re"
- /Subject: Common Criteria, Certification, Zertifizierung, Kernkonzept, Mikrokernel L4Re
- /Title: Urkunde BSI-DSZ-CC-1177-2025
- pdf_file_size_bytes: 230300
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
1177a_pdf.pdf |
0232a.pdf |
| pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-1177-2025
- cert_item: L4Re Secure Separation Kernel CC Version 1.0.1
- cert_lab: BSI
- developer: Kernkonzept GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cert_id: BSI-DSZ-CC-0232-2004
- cert_item: Philips P5CC036V0M Secure Smart Card Controller
- cert_lab: BSI
- developer: Philips Semiconductors GmbH Business Line Identification
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0227: 1
- BSI-DSZ-CC-0232: 3
- BSI-DSZ-CC-0232-2004: 25
- NL:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 1
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 4
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 10
- EAL5 augmented: 2
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 4
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_COP.1: 1
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FRU:
|
| pdf_data/report_keywords/cc_claims |
- OE:
- OE.HARDWARE: 1
- OE.NOEVIL: 1
- OE.PHYSICAL: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- physical probing: 2
- side channel: 1
- timing attacks: 1
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 32: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 25: 2
- AIS 26: 3
- AIS 31: 4
- AIS 32: 3
- AIS 34: 2
- AIS 36: 6
- AIS31: 1
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 15408:1999: 1
- ISO/IEC15408: 1999: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 7] Final Evaluation Technical Report, Version 2, 2025-02-04, atsec information security GmbH, (confidential document) 7 specifically • AIS 1 Anforderungen an Aufbau und Inhalt von Einzelprüfberichten für Evaluationen: 1
- Separation Kernel CC, Version 1.0.1 Konfigurationsliste, Version 1.0, 2024-11-18, Kernkonzept GmbH (confidential document) [9] L4Re Secure Boot Guidance, 2022-10-07, Kernkonzept GmbH [10] L4Re Configuration Guidance: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- ConfidentialDocument:
- April 2004, Evaluation of Philips P5CC036V0M Secure Smart Card Controller, Philips Semiconductors (confidential document) BSI-DSZ-CC-0232-2004 Certification Report B-25 [7] Security Target Lite BSI-DSZ-CC-0232, Version: 1
- P5CT072V0M Secure Smart Card Controller, Philips Semiconductors, Business Line Identification (confidential document) (including relevant information for Philips P5CC036V0M, too) [16] Instruction Set SmartMX-Family: 1
- Semiconductors, 8 April 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Preliminary Specification: 1
- Semiconductors, Revision 2.3, 7 April 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD: 1
- Technical Report, Philips P5CC036V0M Secure Smart Card Controller, Version 1.0, 23 July 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German: 1
- according to AIS 36, Version 1.0, 20 July 2004 for Philips P5CC036V0M Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0232, Version 1.2: 1
|
| pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Kernkonzept, Mikrokernel L4Re"
- /Subject: Common Criteria, Certification, Zertifizierung, Kernkonzept, Mikrokernel L4Re
- /Title: Certification Report BSI-DSZ-CC-1177-2025
- pdf_file_size_bytes: 326892
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: BSI
- /CreationDate: D:20040908143040
- /Creator: Microsoft Word - 0232a.doc
- /ModDate: D:20040908143233+02'00'
- /Producer: Acrobat PDFWriter 4.0 für Windows NT
- /Title: 0232a.PDF
- pdf_file_size_bytes: 199581
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 48
|
| pdf_data/st_filename |
1177b_pdf.pdf |
0232b.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 2
- EAL4: 4
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 35
- EAL5 augmented: 1
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 3
- ACM_SCP.2: 4
- ACM_SCP.3: 5
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 3
- ADV_FSP.2: 4
- ADV_FSP.3: 6
- ADV_HLD: 1
- ADV_HLD.3: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.2: 1
- ADV_SPM: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 2
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 1
- AVA_SOF.1: 2
- AVA_VLA.4: 3
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 30
- FDP_ACC.1: 4
- FDP_ACC.2: 8
- FDP_ACF: 30
- FDP_ACF.1: 20
- FDP_IFC.2: 7
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FIA:
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 39
- FMT_MSA.1: 5
- FMT_MSA.3: 15
- FMT_MTD: 5
- FMT_MTD.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 6
- FMT_SMR.1: 6
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 4
- FCS_CKM.4: 3
- FCS_COP.1: 13
- FCS_COP.1.1: 1
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 33
- FDP_ACC.1.1: 2
- FDP_ACF.1: 30
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 10
- FDP_ITC.1: 4
- FDP_ITT.1: 6
- FDP_SDI.1: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 29
- FMT_MSA.1.1: 2
- FMT_MSA.2: 4
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FRU:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ENVIRONMENT: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- O:
- O.AVAILABILITY: 11
- O.CONFIDENTIALITY: 19
- O.INTEGRITY: 5
- OE:
- OE.HARDWARE: 2
- OE.NOEVIL: 2
- OE.PHYSICAL: 2
- T:
- T.DEPLETION: 2
- T.DISCLOSURE: 2
- T.MODIFICATION: 2
|
- O:
- O.MEM_ACCESS: 8
- O.MF_FW: 8
- O.RND: 3
- O.SFR_ACCESS: 8
- T:
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 3
- Triple-DEA: 1
- Triple-DES: 10
- DES:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 10
- fault injection: 3
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 14
- Physical Probing: 2
- physical probing: 1
- timing attacks: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Kernkonzept GmbH
- /Keywords: L4Re Operating System Framework, L4Re Hypervisor, Microkernel, Operating system
- /Subject: L4Re SSK
- /Title: Security Target for L4Re Secure Separation Kernel CC 1.0.1
- pdf_file_size_bytes: 621521
- pdf_hyperlinks: https://l4re.org/doc/group__l4__icu__api.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /CreationDate: D:20040630130634+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20040630130634+02'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - st-lite_p5cc036v0_v1_0.doc
- pdf_file_size_bytes: 411364
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |