This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Samsung Galaxy Devices on Android 14 - Fall CCEVS-VR-VID-11539-2024 |
Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3 CCEVS-VR-10452-2012 |
|
---|---|---|
name | Samsung Galaxy Devices on Android 14 - Fall | Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3 |
category | Mobility | Boundary Protection Devices and Systems |
status | active | archived |
not_valid_after | 23.12.2026 | 01.11.2014 |
not_valid_before | 23.12.2024 | 28.06.2012 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-ci.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-st.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Juniper Networks, Inc. |
manufacturer_web | https://www.samsung.com | https://www.juniper.net/ |
security_level | {} | EAL2+, ALC_FLR.2 |
dgst | ccfb157305084c14 | 2874fcfdedc57721 |
heuristics/cert_id | CCEVS-VR-VID-11539-2024 | CCEVS-VR-10452-2012 |
heuristics/cpe_matches | cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:* | cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:* |
heuristics/related_cves | CVE-2023-42559, CVE-2025-20960, CVE-2024-20890, CVE-2024-34595, CVE-2024-34668, CVE-2025-20890, CVE-2024-49410, CVE-2025-20892, CVE-2024-34603, CVE-2024-20899, CVE-2024-34652, CVE-2024-34617, CVE-2024-34643, CVE-2025-20887, CVE-2024-34637, CVE-2024-34676, CVE-2024-34606, CVE-2024-20855, CVE-2024-20885, CVE-2025-20958, CVE-2024-34651, CVE-2024-20813, CVE-2024-34611, CVE-2025-20891, CVE-2024-20877, CVE-2024-49415, CVE-2024-20888, CVE-2024-20818, CVE-2024-34589, CVE-2024-49413, CVE-2024-20812, CVE-2024-34591, CVE-2024-34650, CVE-2023-42560, CVE-2023-42556, CVE-2024-20892, CVE-2024-20891, CVE-2024-49401, CVE-2023-42570, CVE-2025-20907, CVE-2024-20817, CVE-2024-20814, CVE-2024-20896, CVE-2024-34653, CVE-2025-20888, CVE-2024-34602, CVE-2024-20898, CVE-2024-34654, CVE-2024-20842, CVE-2025-20937, CVE-2025-20893, CVE-2024-20878, CVE-2024-34667, CVE-2024-34679, CVE-2024-20862, CVE-2024-20858, CVE-2024-34615, CVE-2024-20883, CVE-2024-20860, CVE-2023-42561, CVE-2024-34586, CVE-2024-20811, CVE-2025-20959, CVE-2024-34639, CVE-2024-20847, CVE-2024-20830, CVE-2023-42566, CVE-2025-20963, CVE-2024-20833, CVE-2024-20859, CVE-2024-20803, CVE-2025-20961, CVE-2024-34647, CVE-2024-34619, CVE-2025-20904, CVE-2024-34655, CVE-2025-20881, CVE-2024-20816, CVE-2025-20953, CVE-2024-20889, CVE-2024-20843, CVE-2024-20831, CVE-2024-34608, CVE-2024-34665, CVE-2024-34662, CVE-2024-34604, CVE-2024-20895, CVE-2024-34588, CVE-2024-20819, CVE-2024-34646, CVE-2024-20900, CVE-2024-20832, CVE-2024-20876, CVE-2024-20874, CVE-2024-20815, CVE-2025-20889, CVE-2024-34682, CVE-2024-20857, CVE-2025-20885, CVE-2024-34594, CVE-2024-34677, CVE-2024-20897, CVE-2023-42567, CVE-2024-20849, CVE-2024-34587, CVE-2025-20964, CVE-2024-20848, CVE-2023-42562, CVE-2023-42565, CVE-2025-20884, CVE-2024-34638, CVE-2024-34649, CVE-2023-42563, CVE-2024-34620, CVE-2024-34669, CVE-2024-20901, CVE-2024-20863, CVE-2024-20884, CVE-2024-20882, CVE-2024-34618, CVE-2024-34641, CVE-2023-42557, CVE-2024-20893, CVE-2025-20934, CVE-2024-49402, CVE-2024-34607, CVE-2024-34666, CVE-2024-34674, CVE-2024-34642, CVE-2024-34640, CVE-2023-42564, CVE-2025-20886, CVE-2024-34644, CVE-2024-34612, CVE-2024-20894, CVE-2024-20861, CVE-2024-34583, CVE-2024-49414, CVE-2024-34675, CVE-2025-20882, CVE-2024-20879, CVE-2024-20806, CVE-2024-20856, CVE-2025-20957, CVE-2024-34610, CVE-2024-34590, CVE-2025-20962, CVE-2024-34605, CVE-2024-20835, CVE-2024-20836, CVE-2024-20880, CVE-2024-34592, CVE-2025-20954, CVE-2025-20955, CVE-2024-34593, CVE-2023-52432, CVE-2024-34678, CVE-2024-34673, CVE-2024-34680, CVE-2024-34616, CVE-2024-34585, CVE-2024-34614, CVE-2024-34648, CVE-2024-20834, CVE-2025-20905, CVE-2024-49411, CVE-2024-20865, CVE-2025-20883, CVE-2024-20875, CVE-2024-34609, CVE-2024-20864 | CVE-2014-2842, CVE-2015-7750, CVE-2018-0059, CVE-2017-2335, CVE-2015-7756, CVE-2015-7755, CVE-2017-2336, CVE-2018-0014, CVE-2017-2339, CVE-2013-7313, CVE-2017-2337, CVE-2017-2338, CVE-2015-7754, CVE-2016-1268 |
heuristics/extracted_sars | AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1, ATE_IND.1, AVA_VAN.1, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1 | AGD_OPE.1, ALC_DEL.1, AGD_PRE.1, ALC_CMC.2, ADV_FSP.2, ALC_CMS.4, ALC_FLR.2, ADV_ARC.1, ATE_IND.2, AVA_VAN.2, ATE_COV.1, ADV_TDS.1, ATE_FUN.1 |
heuristics/extracted_versions | 14 | 6.3 |
heuristics/protection_profiles | e8fcfe94dc27b54b, 29ba341b00e9bd10, f84bb9133ca2c8db, 83014eb399a802f3, 593b939921a117e0, c40ae795865a0dba | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.4_PP.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLAN_AS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf | {} |
pdf_data/cert_filename | st_vid11539-ci.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid11539-vr.pdf | st_vid10452-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11539-st.pdf | st_vid10452-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |