Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi AE45C (HD65145C) Smartcard Integrated Circuit Version 01
BSI-DSZ-CC-0168-2002
HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
ISCB-5-RPT-C055-CR-v1
name Hitachi AE45C (HD65145C) Smartcard Integrated Circuit Version 01 HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
category ICs, Smart Cards and Smart Card-Related Devices and Systems Network and Network-Related Devices and Systems
scheme DE MY
not_valid_after 01.09.2019 18.03.2020
not_valid_before 01.05.2002 18.03.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0168a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0168b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf
manufacturer Hitachi, Ltd. HP TippingPoint
manufacturer_web https://www.hitachi.com/ https://www.hp.com/
security_level EAL4+, AVA_VLA.4, AVA_MSU.3, ADV_IMP.2, ALC_DVS.2 ALC_FLR.2, EAL3+
dgst a167d2b92d71eb88 2cfde4db66d5e375
heuristics/cert_id BSI-DSZ-CC-0168-2002 ISCB-5-RPT-C055-CR-v1
heuristics/cert_lab BSI []
heuristics/extracted_sars ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ALC_LCD.1, ALC_DVS.2, AVA_VLA.4, ADV_HLD.2, ATE_COV.2, AVA_MSU.3, ASE_PPC.1, ASE_DES.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 01 3.7.2
heuristics/scheme_data
  • cert_no: 2015-001-C055
  • certification_date: 18.03.2015
  • developer: Trend Micro TippingPoint
  • enhanced:
    • assurance_level: EAL3+ALC_FLR.2
    • category: Network and Network-Related Devices and Systems
    • cert_id: C055
    • certification_date: 18.03.2015
    • developer: Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/
    • expiration_date: 18.03.2020
    • mutual_recognition: CCRA
    • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf
    • scope: The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf
    • type: Hardware-based intrusion prevention systems
  • expiration_date: 18.03.2020
  • level: EAL3+ALC_FLR.2
  • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120
maintenance_updates

pdf_data/report_filename 0168a.pdf ISCB-5-RPT-C055-CR-v1.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0168-2002
    • cert_item: Hitachi AE45C (HD65145C) Smartcard Integrated Circuit Version 01
    • cert_lab: BSI
    • developer: Hitachi Ltd
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0168: 1
    • BSI-DSZ-CC-0168-2002: 22
  • MY:
    • ISCB-5-RPT-C055-CR-v1: 28
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 14
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL2: 1
    • EAL3: 8
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 3
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 4
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 3
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 4
  • ALC:
    • ALC_FLR.2: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 1
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FAU:
    • FAU_SEL.1.1: 1
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4.1: 1
  • FMT:
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 11
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 4
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Physical Probing: 1
    • physical probing: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
  • FIPS:
    • FIPS PUB 140-1: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC15408: 1999: 2
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0, 03 May 2002, for the Product Hitachi Single-Chip Microcontroller AE45C (HD65145C) Version 01, (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • AE-4 Series, Guidelines for using the AE45C Rev. 1.11, 30 April 2002, Hitachi, Ltd., (confidential document) [12] Hitachi Single-Chip Microcomputer, AE-4 Series, AE-4 Series AE45C (HD65145C), Current Control: 1
    • AE45C]), V1.42, 29 March 2002, (confidential document) [14] Federal Information Processing Standards Publication, Security Requirements for Cryptographic: 1
    • Rev. 1.2, 24 January 2002, Hitachi, Ltd., (confidential document) [13] Hitachi, Semiconductor Technical Report, Option List for Smart Card Microcomputer (for: 1
    • Security Target, Semiconductor & Integrated Circuits Hitachi, Ltd., Version 1-3, 29 March 2002, (confidential document) [7] AE45C (HD65145C) Version 01, Smartcard Security Target, (Public version), Semiconductor &: 1
pdf_data/report_metadata
  • /Author: BSI
  • /CreationDate: D:20020508105002
  • /Creator: Microsoft Word - 0168a.doc
  • /ModDate: D:20020508150116+02'00'
  • /Producer: Acrobat PDFWriter 4.0 für Windows NT
  • /Title: 0168a.PDF
  • pdf_file_size_bytes: 176459
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: ISCB Department
  • /CreationDate: D:20150318142844+08'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: HP TippingPoint Intrusion Prevention System
  • /ModDate: D:20150318142844+08'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
  • /Title: C055 Certification Report
  • pdf_file_size_bytes: 733406
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename 0168b.pdf TippingPointST 1-0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
  • EAL:
    • EAL 3: 5
    • EAL 3 augmented: 4
    • EAL3: 1
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_AGM: 1
    • AGD_USR: 2
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.3: 12
    • ADV_TDS: 1
    • ADV_TDS.2: 13
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.3: 13
    • ALC_CMS: 1
    • ALC_CMS.3: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_DVS: 1
    • ALC_DVS.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 18
    • ALC_LCD: 1
    • ALC_LCD.1: 6
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 5
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 14
    • FCS_COP.1.1: 2
    • FCS_RND: 1
    • FCS_RND.1: 8
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 9
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 9
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 27
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 13
    • FRU_FLT.2.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 5
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 2
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 3
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP: 2
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 3
  • T:
    • T.RND: 3
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 2
    • A.PROTECT: 2
  • O:
    • O.ACCESS: 4
    • O.ADMIN: 4
    • O.ANALYZER: 6
    • O.AUDIT: 4
    • O.INTEGRITY: 3
    • O.RESPONSE: 7
    • O.REVIEW: 6
    • O.SENSOR: 7
    • O.STORAGE: 4
    • O.TRAFFIC: 3
  • OE:
    • OE.CONFID: 2
    • OE.INSTALL: 2
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ACCIDENT: 2
    • T.ACCOUNT: 2
    • T.COMPROMISE: 3
    • T.CONFIG: 2
    • T.INFLUX: 3
    • T.LOSSOF: 2
    • T.MALICE: 3
    • T.MISUSE: 3
    • T.PRIVILEGE: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 41
  • AES_competition:
    • AES:
      • AES: 3
    • RC:
      • RC2: 2
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 9
    • SSHv2: 7
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 6
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 15
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 14
    • Physical Probing: 2
    • Physical probing: 1
    • physical probing: 4
  • other:
    • reverse engineering: 2
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
  • FIPS:
    • FIPS PUB 140-1: 1
    • FIPS PUB 46-3: 3
    • FIPS140-1: 2
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • FIPS:
    • FIPS 140-2: 2
  • X509:
    • X.509: 1
pdf_data/st_metadata
  • /CreationDate: D:20020502113112+01'00'
  • /ModDate: D:20020502113112+01'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • pdf_file_size_bytes: 336673
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 63
  • /Author:
  • /CreationDate: D:20150318142909+08'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20150318142917+08'00'
  • /Producer: Foxit Reader PDF Printer Version 7.0.1.831
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1322388
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different