Software Modularisation and the Common Criteria

Size: px
Start display at page:

Download "Software Modularisation and the Common Criteria"

Transcription

1 Software Modularisation and the Common Criteria A Smartcard Developer s Perspective Dr. Karsten Klohs Morpho, Riemekestraße 160, PADERBORN karsten.klohs@morpho.com Abstract. The Common Criteria (CC) establishes assurance into a specific product by considering a precisely defined product configuration as target of evaluation. In contrast, software development techniques strive for modularization to support the re-use or the exchangeability of components. We investigate the classical re-use approaches in the CC - like the re-evaluation approach, the composite evaluation of security ICs and embedded software and the CC assurance class ACO - and analyse what challenges remain from the perspective of a Smartcard OS development. One key observation is that the re-use of software components usually takes place on a lower-level software design. Interestingly, the newest version of JIL document on security architecture requirements for smartcards and similar devices establishes a first starting point for the modularization of the security description of an operating system which might simplify the re-use of software components in different products and their evaluations. The idea is to describe the security interface and the security mechanisms implemented by a component independently from a concrete security problem, so that this description can be re-used in several evaluations. Keywords. Common Criteria, Smartcard, Modularisation 1 Introduction One key concept of software development is the modularisation of software i.e. the decomposition of the whole software system into system elements, subsystems, and modules. The names for these structures can differ from one developer to another but the general approach is always the same. We stick to the terminology of the Common Criteria in the sense that subsystems and modules form the intermediate and final levels of decomposition. We also use the term component if the level of decomposition is not relevant. The primary aims of the software modularisation are the following: if a large complex problem is broken down into pieces then it is possible to solve each of the sub-problems in isolation and to distribute the development activities on different teams

2 if the other modules are not aware about the concrete implementation of a solution in one of the modules then it is possible to exchange the implementation without impact on the remaining parts of the system once a sub-problem is solved within a single module it is possible to re-use the module in another problem context where the same sub-problem has to be solved. Thus, a good system design strives for the definition of modules which can be reused or exchanged easily. The definition of interfaces is vital for the modularisation of software. An interface describes which sub-problem a module has to solve so that the solution can be used by other modules to fulfil their tasks. It describes the properties of the intended solution without defining the details of the implementation. Thus, it defines what problem shall be solved but not how. Within a system you can identify internal and external interfaces. Consider the following abstract system that decomposes into two sub-systems A and B. Furthermore, the decomposition of the sub-system A is shown, while we abstract from the decomposition of sub-system B. One observation is that the question what is an external and what is an internal interface depends on the level of decomposition that is analysed. The interface between module 1 and module 2 is an external interface of module 2 but confined within the sub-system A. Similarly the interface between module 2 and the sub-system B is an external interface of the sub-system A but an internal interface of the whole system, while module 1 provides an interface to the external world. A second observation is that each interface can be seen from two different perspectives: it is provided by one component and required by one or many other compo-

3 nents. There is a subtle difference between the question which module provides and requires an interface and the question which module depends on the other. The answer to the second question is given by the design decision where to define the interface. Consider the following figure. Module 2 requires the service and module 1 provides the service defined by the interface. If the interface is defined in the context of module 1 then module 2 depends on module 1. This is the usual case, because it is quite natural to define a service independently from the usage environment. In contrast, if the interface is defined in the context of module 2 then the dependency is inverted. This dependency inversion is a key technique to avoid upward dependencies in the software design. Consider the start-up phase of a security IC: After power-on the security IC firstly initialises the memory and all hardware elements before he transfers control to the embedded software. This is achieved by a well defined interface in this case the jump to a specific memory address but the implementation of this interface has to be provided by the embedded software. Obviously, the security IC is responsible for defining this interface because otherwise the IC becomes dependent on the embedded software. Such kinds of interfaces are also sometimes called call-backs or hooks. How does these elementary principles of software modularisation relate to a Common Criteria evaluation? First of all, the primary aim of the software development to structure the system in a way which simplifies the re-use and exchangeability of single elementary modules remains unchanged under an evaluation. As a consequence, the evaluation evidence for a single module shall be re-usable in another system context and the security assessment of the rest of the system should remain stable if one module implementation is replaced by another. We have observed that the definition of interfaces is vital to support a proper modularisation of a system. Interestingly, the CC already defines a framework for the definition of security properties of interfaces : Security Functional Requirements (SFRs) can be used to express and model the security services which a system shall

4 provide. Secondly, objectives for the environment (OEs) can express the requirements that have to be fulfilled by collaborating components. However, the attempt to apply SFRs and OEs to model the provided and required security interface of software modules in way that the security assessment can be reused leads to the following fundamental challenges. The primary intent of the objectives for the environment is to model organisational and other high-level requirements and not software interfaces. A simple way to use them for at least establishing the link to software interfaces is to claim that a dependent component shall adhere to the security guidance of the provided component. However, this approach does not support the precise identification of the security interfaces of the providing component. Security Functional Requirements define the security problem a system shall fulfil. The software developer s aim is to re-use the same system for solving many security problems in a similar way. Thus, there is an upward dependency from the implemented system to the problem describing SFRs which results in a reassessment of similar implementation if it is used to solve different problems. Finally, the most critical challenge is that the SFR model does not support the decomposition into smaller bricks which is the primary aim of software interfaces. In particular, it is more convenient to model the security properties of a low-level module interface much closer to the software interface which is responsible for the implementation. Therefore, this paper suggests defining a model for security properties of software components which exhibits the following properties. Describe the security properties of the components based on the implemented security functionality and not with respect to the security problem solved by a concrete product. This is a kind of dependency inversion which aims at resolving the upward link between the system implementation and the security problem definition at the highest-level of abstraction. This way, the internal representation of the security architecture can remain stable if the system is used to target another security problem. The model shall support the decomposition of large scale security features into smaller security mechanisms which in turn are defined close to the software interface definitions. The intent is to re-use the security definition of features and interfaces of those components which remain stable and to allow for the exchange of security implementation without modification of the security architecture of the system provided that the security properties of the interface remain stable. The aim is to support the security assessment of a system within a security evaluation and not to use the concept for a compositional evaluation approach. The reason for this that re-use of modules takes place on the lowest level of decomposition while each compositional evaluation always exhibits some process overhead. A chip-card operating system can easily decompose into say 50 modules but you want for sure not to run 50 evaluation processes in parallel. However, if 48 of the

5 50 modules remain stable you want to benefit from their security assessment even if the set of SFRs have completely changed, because the system targets a different security problem. The paper investigates the following topics. Firstly, we review the existing reevaluation and composite evaluation approaches in order to identify in which application scenarios they work fine. Re-evaluation is in particular useful for product maintenance i.e. if a successor version solves the same security problem but with limited changes in the implementation. Composite evaluation is useful if it is possible to factor out a large component which a standardised and stable interface. It is in particular useful if one vendor supplies the base component to many other vendors and to connect certificates in a bottom-up way. Secondly, we take a very brief look at the problems addressed by the ACO class to get a first impression about the issues arising in a composition. Finally, a review of the JIL document Security Architecture for Smartcards and Similar Devices will show that the notion of Security Features, Security Mechanisms, Security Services, and Security Properties can serve as a first starting point for the security description model described above. 2 Maintenance and Re-Evaluation: The Delta-Analysis Approach The certificate maintenance or re-evaluation approach works fine if the new product contains comparatively few changes and if it addresses the same security problem. The following figure shows an abstracted software iteration where only the module 2 has been updated. The tracing of the security functional requirement which defines the security problem is depicted by red boxes. In this case module 1 and module 3 do not have to be reconsidered and the reevaluation can focus on verifying that the changed module 2 contributes to the im-

6 plementation of the SFR in the same way than the original one. The situation can become less convenient if the new product targets a different security problem as depicted on the left-hand side of the following figure. The original security assessment of the module 1 had been conducted from the perspective of the red security functional requirement. It yielded the result that the collaboration of module 1 and module 2 correctly implemented this security requirement. However, the security properties defined by the interface between theses modules as well as the security properties of the interface to module three are not explicitly expressed. Therefore, it is more difficult to re-use parts of the security assessment of the previous evaluation for tracing the blue security functional requirement. Therefore, the idea is to use an explicit security description of the implementation of the whole system to support the tracing of arbitrary SFRs as depicted by the yellow triangles on the right-hand side of the figure. The differing SFRs still have to be traced which makes the second situation in general more complex than a simple maintenance of the same product. However, the evaluator may identify the impact of software changes on the security implementation of the system more quickly if all the security properties of the system have been explicitly defined and reviewed. 3 Composite Evaluation of a Security IC with Dedicated and Embedded Software The composite evaluation of a security IC with dedicated software like a crypto library and with some embedded software like a secure chip card operating system is the prime example how the common criteria methodology can be applied to the composition of high-level components. The general intent is to gain a formal CC certificate for each of the components which is then re-used for the evaluation of the dependent components as depicted in the following figure.

7 The important properties of this approach are the following: The approach is inherently bottom-up, i.e. the different evaluation approaches subsequently extend the scope of the evaluation. The provided security interface of each component is formulated in terms of SFRs, so that the composition approach fits to the evaluation methodology. Furthermore, the interfaces of a security IC and of a crypto library are comparatively stable and well standardized. The treatment of the required security interfaces is more subtle: usually they are formulated in terms of general objectives for the environment (OEs) like the embedded software follows the security guidance of the IC. We will now elaborate a little bit more on these properties in order to determine how this approach relates to software modularisation techniques. 3.1 Analysis of the Bottom-Up Certification The bottom-up approach has the advantage that it is possible to build security functionality in the upper layers directly upon the security services provided by the lower layer. This approach is very convenient for the developers of the base components

8 because they can make their base component available in a certified configuration to a wide range of dependent components. Interestingly, this approach is not widely extended to embedded software though it would be an interesting option. We want to identify the reasons for that in the following and start with a very simple scenario. Assume that one specific product implemented by a piece of embedded software shall be made available on two different security ICs. In this case the porting to the new platform is usually covered by a second embedded software evaluation. The embedded software developer uses sound design principles and factors out a hardware abstraction layer (HAL) in order to provide a common interface to the rest of the embedded software as depicted in the following figure. As a consequence, it is possible to perform the second evaluation as a (delta) reevaluation to re-use at least the evidence about the stable parts of the embedded software. Interestingly, the approach to extend the bottom-up approach to the HAL-layer(s) and to execute the two product evaluations as composite evaluations is not taken by embedded software developers. This is the case, even though such an approach can have additional benefits to the embedded software developer if she hosts two different products on the same HAL-implementation as depicted in the next figure.

9 So what are the differences with respect to the successful IC-ES composite approach? Firstly, the separate consideration of the HAL layer from the rest of the embedded software does not reduce but increase the number of certification processes to be maintained by the software developer. The additional formal overhead of factoring out a HAL evaluation is significant. An additional security target has to formalise the security properties of the HAL component, and additional composite activities have to be conducted to connect the evaluation processes to each other. However, there are also other more technical issues of the approach. Firstly, the security interface of the HAL component has to be described in terms of security functional requirements and objectives for the environment which is in this case the embedded software. Of course, this has also been done for the underlying crypto library and the security IC but obviously works best if the structure of interface fits well to the SFRs defined in part 2 of the Common Criteria /CC_P2/. This is the case for the abstraction of crypto primitives but for additional HAL functionality like the abstraction of the underlying IO facilities or the basic memory management formulation efforts are required. There are also some technical challenges in the design of the HAL. An inherent property of smartcard embedded software development is that the software structures have to be as small and as efficient as possible due to the limited resources of the chip. Therefore, the embedded software developer strives to design the HAL layer in a way that it can be tailored to the mission.

10 There are two different sub-aspects that induce challenges for the evaluation. Firstly, an optimal solution for integrating the HAL into a second product ES_B may be achieved by a slight modification of the separation of responsibilities between the HAL and the remaining ES i.e. a modification of parts of the interface. This restricts the re-usability of the HAL a little bit but this can be acceptable in comparison to the gain in performance or memory consumption. However, even minor changes in the HAL component would trigger maintenance or re-evaluation if the HAL is evaluated stand-alone which in turn increases the process overhead. Of course, tailoring the interface is feasible only if the two collaborating components are supplied by the same vendor in the IC-ES composition scenario the embedded software developer has to take the security IC and its libraries as is. Thus, we conclude that advantages of re-use significantly depend on the stability of interfaces. The second sub-aspect is not related to optimisation but to differing requirements. If some hardware dependent functionality is required for the embedded product A but not for the embedded product B then a good design of the supportive HAL would supply configuration options that add, remove, or adopt functionality. This in turn increases the probability of changes in implementation of the HAL which lead to a more complex reassessment if the modified is used in a second product. 3.2 Conclusions for Modular Software The discussion in the previous section showed that a bottom-up composite certification approach works comparatively fine, if the interfaces between the two component are stable which is for example likely if standard functionality is implemented or if the components are supplied by different vendors it is easy to describe the security properties of the interface in terms of SFRs which is the case for cryptographic functionality but becomes more complex for arbitrary software interfaces. On the other hand, an embedded software developer strives for a balance between the reusability of components and an optimal integration of sub-components into the system. This in turn leads to minor but continuous evolution of interfaces and to a design which supports configurability. As a consequence, the more natural way for a software developer to re-use parts of her security implementation is the following: focus the re-use activities on the support of the delta analysis instead of maintaining several full-fledged certification tracks describe the security properties of the interface between different components on a level of granularity which is as close as possible to the software interface. The intention here is to re-use the assessment of the stable software elements so that the re-assessment can focus on the changing parts. additionally, the direct link of the security property description to the software modules simplifies the handling of various configurations. The software developer

11 can formulate the security properties of the superset of all module variants and then re-use this description for a specific configuration of a newly evaluated product. We will not dig into the details of the difficulties to certify a highly configurable product in the following even though this is also a very interesting topic. A very evident idea to achieve this goal is to formulate the security aspects of the implementation with the same techniques that are used to structure the software. The software developer decomposes the software into modules and defines interfaces between those modules in a way which support the re-use of modules in different contexts and the simple exchangeability of an implementation without the modification of interface. Thus, if the security implementation is also described in terms of security interfaces and the security properties of modules then this description should at least simplify the security assessment of the unchanged parts of the system. The following chapters elaborate more on this general idea. 4 Assurance Class ACO Even though the CC supporting document on the Composite Evaluation for Smartcards and Similar Devices /CCDB_COMP/ correctly points out that this assurance class is not sufficient to conduct composite evaluations at a high assurance level it is still worthwhile to take a brief look onto the issues addressed by the ACO class in /CC_P3/ because it provides first insights in the challenges which arise if two components are combined with each other. Consider the following figure taken from /CC_P3/ p.175 which shows the different kinds of dependencies between a dependent component A and a base-component B.

12 Firstly, the class ACO_REL points out, that the implementation of security functionality in the dependent component may rely on the services supplied by the base component. In order to support the assessment if the base component fits the need of the dependent component, the service requirements of the dependent component shall be explicitly stated. This is the similar to describing the required interfaces of a component and should be taken into account when describing the security interfaces of a component. Secondly, the figure shows that the services that the dependent component depends upon may not necessarily be in the scope of the TSFI of the base component. This can happen if the security problem targeted by the base component has not taken into account the specific usage scenario of the dependent component. To deal with this situation the ACO_DEV class requires additional implementation evidence about the non-tsf interfaces of the base component. Obviously, these can be taken from the ADV_TDS evidence of the base component. This is a hint, that a combined description of the security properties and the functional properties is worthwhile to increase the potential to re-use the description in other contexts. Additionally, the ACO class also mandates additional testing and vulnerability assessment of the composed TOE. This is not surprising from the software development point of view because it appears to be an incarnation of the usual problem that even after intensive component testing additional integration tests are necessary to ensure that the composition did not yield to subtle problems in the combined system state. All in all the ACO class already addresses some of the issues which have to be taken into account if an already assessed component shall be coupled with another component with only limited knowledge about the base component. As such, it can act as a useful input for understanding the analysis needs when some software module shall either be re-used or exchanged in some evaluation. The idea is to take most of the issues addressed in different composition models into account when establishing the description of security implementation of a system. This is not mandatory because the evaluator has access to all necessary information if the composed TOE is considered as a whole. However, strategies like explicitly formulating the required interfaces and provide input for security assessments at the level of all modules can help to simplify the delta-analysis and the re-consideration of security functionality in other contexts. 5 JIL Document on Security Architecture Requirements The primary target of the JIL document on Security Architecture Requirements for Smartcards and Similar Devices is to provide guidance for identifying the central security properties a smart card device has to enforce. Due to that fact that a smartcard is build to operate in a hostile environment where an attacker has physical access to the TOE these properties are: self-protection even under massive perturbation of the execution code and manipulation of stored data

13 non-bypassablity in particular the obfuscation of so called side-channels like the power consumption or electromagnetic emanation which can leak information about secret data. Secure-startup i.e. the secure initialisation of the security functionality from a down-state which may be induced either by sudden power-cut of or the transition to power-safe modes. The increasing market demand for open, expandable platforms as defined e.g. by Global Platform and Java, adds the security property of a strong domain separation mechanism, which provides a secure execution environment to different applications sharing the system resources. These security properties are specific because the do not exhibit observable interfaces. They are confined within the system and react usually in case of an external attack and not in normal operation mode. Therefore, they cannot be traced easily via the functional product interface like normal SFRs and as such shall be described by the developer evidence of the ADV_ARC part. The informative annex of the security architecture document /EXS_JIL_SARC2/ suggests a terminology of security features, security mechanisms, security services, and security properties to describe the security architecture of the system as shown in the following overview. Interestingly this terminology covers several of the fundamental needs for the description of the modularisation of security implementations. A security function is a description what TOE does in order to meet one or more SFRs. This notion is strongly related to the observation of this paper that it is more natural for the developer to describe the implemented security functionality independently from the security problem. A problem independent description supports the reuse of already existing components in other problem contexts which is one of the key goals of a modular design also. A security feature denotes a combination of security functions and security properties implemented to advert an attack. The term primarily originates in the observation that a combination of functionality and inherent properties of software has to be considered to understand how a security feature is designed. However, it also indicates that there is a need of different levels of description. This is similar to the decomposition approach of software modularisation where the developer also decomposes a high-level functionality into its elementary parts. The elementary parts of the security architecture description are security mechanisms and architectural countermeasures. A security mechanism is a concrete implementation of security functionality or an enforcement of architectural soundness. Provided that the developer encapsulates such elementary building blocks in modules, the notion of security mechanisms can prove to be a valuable starting point for modelling the security implementation of a system. The description of the security implementation should describe for each module the implemented security mechanisms which can then in turn be combined to higher-level security features depending on the concrete product under consideration. Architectural countermeasures cover design principles and implementation techniques that support and collaborate with security mechanisms. One example of such a

14 measure is a strict layering of the operating system architecture e.g. by abstracting the hardware interface in a hardware abstraction layer. The fact that the rest of the operating system interacts via this interface with the hardware only and that the HAL can internally enforce hardware specific security requirements minimises the risk that some operating system mechanism can unintentionally interfere with the security critical hardware management. A second example of an architectural countermeasure is the structured use of execution flow protection mechanisms throughout the whole software. The difference to security mechanisms is that the architectural measures cannot be directly assigned to a single implementing module. To summarise the modelling approach suggested by the JIL security architecture document appears to be capable to support the modular description of the security implementation of a system in a generic way. The other notions of security service and security properties can be interpreted from the perspective of exposed interfaces on different layers of decomposition. The term security service emphasises that the service offers some security implementation to an entity in the external world. Such an entity can be a user but also some other sub-system of the TOE e.g. the interface of a dedicated crypto library or a hardware abstraction layer. In any case, a security service is visible at an exposed interface. A security property is some invariant enforced by a component on which a user of the module can rely upon. Such invariants are confined within a component and not visible at the component s external interface. Depending on the level of decomposition which is considered, the notion of security services and security properties can vary. For example, a module in the crypto-library can offer random number generation to the rest of the system as a security service. Other components of the system may use this service for execution randomisation which in turn helps to enforce the non-bypassability property of the system by obfuscating side-channels. On this higher-level of abstraction the underlying security service is no longer directly offered via an exposed interface but contributes to security implementation confined within the system. These observations give rise to the following developer s approach to the description of the security implementation and design of a system: Design the security architecture in terms of generic security features which can be used to fulfil a wide range of security functional requirements of security problems. Decompose these security features into security mechanisms which form the elementary building blocks of the security implementation. The security mechanisms should be formulated on a level of detail which supports the stand-alone implementation within a single module. This way, the security mechanisms shall become reusable and exchangeable. Describe how different security mechanisms and other design concepts collaborate to advert attacks i.e. what high-level functionality they shall support. This description is driven by the security mechanisms so what is implemented in the software and can as such be re-used at least partially if two software derivates target different security problems.

15 This approach is security mechanism centric and as such similarly useful for describing the implementation of security services offered to the user and to describe the implementation of security invariants and properties inherently enforced by the system. Even though the intent of the security architecture document is to focus on the inherent security properties of the system, it is more natural from the developer s perspective to describe the collaboration of all security mechanisms in the same way. First results form discussions with Morpho development teams are quite promising. The focus on the security implementation of the system and in particular the close link to the modular structure of the system components simplifies the discussions between security architects and the developers. The question in how far the approach supports and simplifies the re-use of security implementation evidence on more complex scenarios than simple product maintenance is currently under investigation. In any case, an evolution of the modelling concepts is likely to become extremely important in the future once the dramatically decreasing product availability times which are one of the primary advantages of flash technology will be exploited on the highsecurity smartcard market. 6 Conclusion and Acknowledgements This paper reviewed the software modularisation techniques and Common Criteria techniques to deal with software maintenance and software composition. The developer would like to focus the description of security functionality on the implemented mechanisms enforced by the elementary modules in order to support the re-use of modules in another product or to simplify the exchange or improvement of implementation with minimal impact on the security architecture of the system. The maintenance and compositional evaluation techniques currently applied to security evaluation in the field of Smartcards and similar devices work especially fine if a product is modified only by adjusting some of its modules or if a larger subcomponent can be factored out which provides a stable interface to the rest of the system. However, the flexibility of the upcoming flash technology is likely to raise the need for more fine-grained re-use and an intense tailoring of modular software. Therefore, the continuous evolution of the description model for the modularisation of security implementation can become a key challenge for a Smartcard developer in the future. I d like to thank the colleagues of the ISCI Working Group I on Methodology and Best Practices for Smart Security Device Evaluation for all the informative discussions about security architecture and the members of the Secure e-documents R&D of Morpho for their valuable feed-back from the developer s perspective.

16 Bibliography /CC_P2/ Title: Identification: Version: Version 3.1 Revision 3 Date: July 2009 /CC_P3/ Title: Identification: Version: Version 3.1 Revision 3 Date: July 2009 Common Criteria for Information Technology Security Evaluation, Part 2: Security functional components CCMB Common Criteria for Information Technology Security Evaluation, Part 3: Security assurance components CCMB /CCDB_COMP/ Title: Identification: Version: Version 1.0 Revision 1 Date: September 2007 /EXS_JIL_SARC1/ Title: Version: Version 2.0 Date: January 2012 /EXS_JIL_SARC2/ Title: Version: Version 2.0 Date: January 2012 Composite Product Evaluation for Smart Cards and Similar Devices CCDB Security Architecture Requirements for Smartcards and Similar Devices Security Architecture Requirements for Smartcards and Similar Devices Annex 1

Joint Interpretation Library

Joint Interpretation Library for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0

More information

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2. Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to

More information

Joint Interpretation Library. Guidance for smartcard evaluation

Joint Interpretation Library. Guidance for smartcard evaluation Joint Interpretation Library Guidance for smartcard evaluation Version 2.0 February 2010 Table of content 1. REFERENCES 5 2. OBJECTIVE 6 3. SMARTCARD PRODUCT PRESENTATION AND DEFINITIONS 7 3.1. Glossary

More information

Joint Interpretation Library

Joint Interpretation Library Joint Interpretation Library Security Architecture requirements (ADV_ARC) for smart cards and similar devices Document purpose: provide guidance to developers to fulfill the Security Architecture requirements

More information

Joint Interpretation Library

Joint Interpretation Library Document purpose: provide rules to ensure that CC is used for hardware integrated circuits in a manner consistent with today s state of the art hardware Version 3.0 February 2009 Joint Interpretation Library

More information

Evaluation paradigm selection according to Common Criteria for an incremental product development

Evaluation paradigm selection according to Common Criteria for an incremental product development Evaluation paradigm selection according to Common Criteria for an incremental product development Andreas Daniel Sinnhofer a.sinnhofer@tugraz.at Wolfgang Raschke wolfgang.raschke@tugraz.at Christian Kreiner

More information

Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems

Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems Security Domain Separation as Prerequisite for Business Flexibility Igor Furgel T-Systems 23th-25th September, 2008, page 2 What are we speaking about? What is a Security Domain and what do we need it

More information

Introduction to Embedded Systems. Software Update Problem

Introduction to Embedded Systems. Software Update Problem Introduction to Embedded Systems CS/ECE 6780/5780 Al Davis logistics minor Today s topics: more software development issues 1 CS 5780 Software Update Problem Lab machines work let us know if they don t

More information

Smartcard IC Platform Protection Profile

Smartcard IC Platform Protection Profile Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt

More information

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2012. Version 3.

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2012. Version 3. Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model September 2012 Version 3.1 Revision 4 CCMB-2012-09-001 Foreword This version of the Common Criteria

More information

Joint Interpretation Library. ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice. IC and ES composition

Joint Interpretation Library. ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice. IC and ES composition ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice IC and ES composition Version 1.2 March 2002 ETR-lite for Composition Annex A Table of Contents 1. Foreword...

More information

Supporting Document Guidance. Smartcard Evaluation. February 2010. Version 2.0 CCDB-2010-03-001

Supporting Document Guidance. Smartcard Evaluation. February 2010. Version 2.0 CCDB-2010-03-001 Supporting Document Guidance Smartcard Evaluation February 2010 Version 2.0 CCDB-2010-03-001 Foreword This is a supporting document, intended to complement the Common Criteria and the Common Evaluation

More information

Security IC Platform Protection Profile

Security IC Platform Protection Profile Security IC Platform Protection Profile Version 1.0 15.06.2007 developed by Atmel Infineon Technologies AG NXP Semiconductors Renesas Technology Europe Ltd. STMicroelectronics Registered and Certified

More information

Guidelines for Developer Documentation

Guidelines for Developer Documentation Guidelines for Developer Documentation according to Common Criteria Version 3.1 Version 1.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Phone: +49 (0)3018 9582-111

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

On Security Evaluation Testing

On Security Evaluation Testing On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Joint Interpretation Library. Guidance for Smartcard evaluation

Joint Interpretation Library. Guidance for Smartcard evaluation Joint Interpretation Library Guidance for Smartcard evaluation Version 1.1 March 2002 Joint Interpretation Library Guidance for smartcard evaluation Table of Contents 1. Objective... 5 2. Smartcard product

More information

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August 1999. Version 2.

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August 1999. Version 2. Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model August 1999 Version 2.1 CCIMB-99-031 Part 1: Introduction and general model Foreword This version of

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification

More information

Chapter 7 Application Protocol Reference Architecture

Chapter 7 Application Protocol Reference Architecture Application Protocol Reference Architecture Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference

More information

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...

More information

Supporting Document Guidance. ETR template for composite evaluation of Smart Cards and similar devices. September 2007. Version 1.

Supporting Document Guidance. ETR template for composite evaluation of Smart Cards and similar devices. September 2007. Version 1. Supporting Document Guidance ETR template for composite evaluation of Smart Cards and similar devices September 2007 Version 1.0 Revision 1 CCDB-2007-09-002 Foreword This is a supporting document, intended

More information

Engineering Process Software Qualities Software Architectural Design

Engineering Process Software Qualities Software Architectural Design Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical

More information

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology Peter Mileff PhD SOFTWARE ENGINEERING The Basics of Software Engineering University of Miskolc Department of Information Technology Introduction Péter Mileff - Department of Information Engineering Room

More information

Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3

Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 1 Mälardalen University, Västerås, Sweden, ivica.crnkovic@mdh.se 2 ABB Corporate Research,

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Citrix Password Manager, Enterprise Edition Version 4.5

Citrix Password Manager, Enterprise Edition Version 4.5 122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT. Peter Graubmann, Mikhail Roshchin

ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT. Peter Graubmann, Mikhail Roshchin 70 ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT Peter Graubmann, Mikhail Roshchin Abstract: In order to exploit the adaptability of a SOA infrastructure, it becomes necessary to provide

More information

Industry Challenges in Embedded Software Development

Industry Challenges in Embedded Software Development Industry Challenges in Embedded Software Development Don Wilson Raytheon Company dwilson4@raytheon.com (520)545-9429 7 July 2005 Copyright 2005 Raytheon Company. All rights reserved. Industry Challenges

More information

Extend the value of your core business systems.

Extend the value of your core business systems. Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Protection Profile for UK Dual-Interface Authentication Card

Protection Profile for UK Dual-Interface Authentication Card Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation

More information

Basic Trends of Modern Software Development

Basic Trends of Modern Software Development DITF LDI Lietišķo datorsistēmu programmatūras profesora grupa e-business Solutions Basic Trends of Modern Software Development 2 3 Software Engineering FAQ What is software engineering? An engineering

More information

Chapter 3: Operating-System Structures. Common System Components

Chapter 3: Operating-System Structures. Common System Components Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1

More information

Chapter 9 Software Evolution

Chapter 9 Software Evolution Chapter 9 Software Evolution Summary 1 Topics covered Evolution processes Change processes for software systems Program evolution dynamics Understanding software evolution Software maintenance Making changes

More information

for Oil & Gas Industry

for Oil & Gas Industry Wipro s Upstream Storage Solution for Oil & Gas Industry 1 www.wipro.com/industryresearch TABLE OF CONTENTS Executive summary 3 Business Appreciation of Upstream Storage Challenges...4 Wipro s Upstream

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

Using the TASKING Software Platform for AURIX

Using the TASKING Software Platform for AURIX Using the TASKING Software Platform for AURIX MA160-869 (v1.0rb3) June 19, 2015 Copyright 2015 Altium BV. All rights reserved. You are permitted to print this document provided that (1) the use of such

More information

Open Smart Card Infrastructure for Europe

Open Smart Card Infrastructure for Europe Open Smart Card Infrastructure for Europe v2 Volume 8: Part 3-1: Authors: Security and Protection Profiles (Common Criteria Supporting Document) eesc TB3 Protection Profiles, Security Certification NOTICE

More information

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2006. Version 3.

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2006. Version 3. Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model September 2006 Version 3.1 Revision 1 CCMB-2006-09-001 Foreword This version of the Common Criteria

More information

Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September 2012. Version 3.

Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September 2012. Version 3. Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components September 2012 Version 3.1 Revision 4 CCMB-2012-09-003 Foreword This version of the Common Criteria

More information

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping

More information

Process-Driven SOA Development

Process-Driven SOA Development Architect: SOA and BPM DOWNLOAD Oracle SOA Suite TAGS SOA, BPM, BPEL, All Architect Articles Process-Driven SOA Development by Matjaz B. Juric Developing end-to-end business process support following the

More information

Component Based Development Methods - comparison

Component Based Development Methods - comparison Component Based Development Methods - comparison Dan Laurenţiu Jişa Abstract: This paper realizes a comparison among three of the best known component based development methods, emphazing on the earlier

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/66 10 Mar 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that the

More information

Applying 4+1 View Architecture with UML 2. White Paper

Applying 4+1 View Architecture with UML 2. White Paper Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was

More information

Architecture Design & Sequence Diagram. Week 7

Architecture Design & Sequence Diagram. Week 7 Architecture Design & Sequence Diagram Week 7 Announcement Reminder Midterm I: 1:00 1:50 pm Wednesday 23 rd March Ch. 1, 2, 3 and 26.5 Hour 1, 6, 7 and 19 (pp.331 335) Multiple choice Agenda (Lecture)

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Software Engineering. So(ware Evolu1on

Software Engineering. So(ware Evolu1on Software Engineering So(ware Evolu1on 1 Software change Software change is inevitable New requirements emerge when the software is used; The business environment changes; Errors must be repaired; New computers

More information

Transition to Agile Development

Transition to Agile Development 2010 18th IEEE International Requirements Engineering Conference Transition to Agile Development Rediscovery of Important Requirements Engineering Practices Juha Savolainen Nokia Research Center Nokia

More information

Modeling The Enterprise IT Infrastructure

Modeling The Enterprise IT Infrastructure Modeling The Enterprise IT Infrastructure An IT Service Management Approach By: David Chiu D.L. Tsui Version 1.2b 2004 David Chiu & D.L. Tsui. All Rights Reserved Acknowledgement The authors would like

More information

On-board Software Reference Architecture for Payloads

On-board Software Reference Architecture for Payloads On-board Software Reference Architecture for Payloads Presenters Victor Bos, phone: +358 400897907, email: victor.bos@ssf.fi Adam Trcka, phone: +420 736650822, email: adam.trcka@evolvsys.cz Introduction

More information

22C:22 (CS:2820) Object-Oriented Software Development

22C:22 (CS:2820) Object-Oriented Software Development The University of Iowa 22C:22 (CS:2820) Object-Oriented Software Development Fall 2012 Software Complexity by Cesare Tinelli Complexity Software systems are complex artifacts Failure to master this complexity

More information

Alternative Assurance Criteria. Dr. David Brewer Gamma Secure Systems Limited www.gammassl.co.uk

Alternative Assurance Criteria. Dr. David Brewer Gamma Secure Systems Limited www.gammassl.co.uk Alternative Assurance Criteria Dr. David Brewer Gamma Secure Systems Limited www.gammassl.co.uk Agenda Motivation Meta Criteria Common Criteria Interpretation Alternative Assurance Criteria Interpretation

More information

Software Engineering. Software Engineering. Component-Based. Based on Software Engineering, 7 th Edition by Ian Sommerville

Software Engineering. Software Engineering. Component-Based. Based on Software Engineering, 7 th Edition by Ian Sommerville Software Engineering Component-Based Software Engineering Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain that CBSE is concerned with developing standardised components

More information

TOGAF TOGAF & Major IT Frameworks, Architecting the Family

TOGAF TOGAF & Major IT Frameworks, Architecting the Family Fall 08 TOGAF TOGAF & Major IT Frameworks, Architecting the Family Date: February 2013 Prepared by: Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. TOGAF

More information

A Componentware Methodology based on Process Patterns Klaus Bergner, Andreas Rausch Marc Sihling, Alexander Vilbig Institut fur Informatik Technische Universitat Munchen D-80290 Munchen http://www4.informatik.tu-muenchen.de

More information

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy TOGAF TOGAF & Major IT Frameworks, Architecting the Family by Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. Copyright 2013 ITpreneurs. All rights reserved.

More information

Certification Report

Certification Report Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

A Framework for Software Product Line Engineering

A Framework for Software Product Line Engineering Günter Böckle Klaus Pohl Frank van der Linden 2 A Framework for Software Product Line Engineering In this chapter you will learn: o The principles of software product line subsumed by our software product

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/70 23 November 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that

More information

A Business Process Driven Approach for Generating Software Modules

A Business Process Driven Approach for Generating Software Modules A Business Process Driven Approach for Generating Software Modules Xulin Zhao, Ying Zou Dept. of Electrical and Computer Engineering, Queen s University, Kingston, ON, Canada SUMMARY Business processes

More information

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework

More information

F-16 Modular Mission Computer Application Software

F-16 Modular Mission Computer Application Software F-16 Modular Mission Computer Application Software Achieving Cross-Platform Compatibility with Increased Productivity and Quality using the OMG s Model Driven Architecture Lauren E. Clark Chief Engineer

More information

Service Modelling & Service Architecture:

Service Modelling & Service Architecture: Service Modelling & Service Architecture: From Service Renewal and Service Flows to Service Architecture Presenter: Professor Paul Buhler Head of the Global University Alliance SOA Research & Development

More information

A refined architecture for DRM

A refined architecture for DRM A refined architecture for DRM Koen Buyens Sam Michiels Wouter Joosen Report CW 450, June 2006 nkatholieke Universiteit Leuven Department of Computer Science Celestijnenlaan 200A B-3001 Heverlee (Belgium)

More information

Fourth generation techniques (4GT)

Fourth generation techniques (4GT) Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

Development models. 1 Introduction. 2 Analyzing development models. R. Kuiper and E.J. Luit

Development models. 1 Introduction. 2 Analyzing development models. R. Kuiper and E.J. Luit Development models R. Kuiper and E.J. Luit 1 Introduction We reconsider the classical development models: the Waterfall Model [Bo76], the V-Model [Ro86], the Spiral Model [Bo88], together with the further

More information

A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability. Availability and Serviceability System

A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability. Availability and Serviceability System 1 A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability Availability and Serviceability System James H. Laros III, Sandia National Laboratories (USA) [1] Abstract This paper

More information

Smartphone applications Common Criteria is going Mobile ICCC2012 Paris

Smartphone applications Common Criteria is going Mobile ICCC2012 Paris Dr. Jens Oberender SRC Security Research & Consulting GmbH Smartphone applications ICCC2012 Paris How to CC-evaluate smartphone apps? Agenda Specify Security Target TOE scope Application specific SFRs

More information

Business Process Modeling with Structured Scenarios

Business Process Modeling with Structured Scenarios Business Process Modeling with Structured Scenarios Doug Rosenberg ICONIX Software Engineering, Inc. In 2008, based on our experience with a number of business process engineering projects over the last

More information

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1. Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

The Development of Mobile Device Management Framework on Android Platform for Devices Security and Applications

The Development of Mobile Device Management Framework on Android Platform for Devices Security and Applications The Development of Mobile Device ment Framework on Android Platform for Devices Security and Applications Kurnia Anggriani kurnia.anggriani@students.itb.ac.id Rinaldi Munir rinaldi@informatika.org Yusep

More information

Myths About Service-Oriented Architecture Demystifying SOA. producers can coexist, and still have no dependence on each other.

Myths About Service-Oriented Architecture Demystifying SOA. producers can coexist, and still have no dependence on each other. WSJ: SOA Myths About Service-Oriented Architecture Demystifying SOA Service-oriented architecture (SOA) refers to an architectural solution that creates an environment in which services, service consumers,

More information

Enterprise Architecture Assessment Guide

Enterprise Architecture Assessment Guide Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and

More information

Non-Interfering Composed Evaluation

Non-Interfering Composed Evaluation Non-Interfering Composed Evaluation How to Exchange Components without Re-Evaluation? Igor Furgel, Viola Saftig, Tobias Wagner (T-Systems) Kevin Müller (Airbus Group Innovations) Reinhard Schwarz (Fraunhofer

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards. March 2009. Version 2.7 Revision 1 CCDB-2009-03-001

Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards. March 2009. Version 2.7 Revision 1 CCDB-2009-03-001 Supporting Document Mandatory Technical Document Application of Attack Potential to Smartcards March 2009 Version 2.7 Revision 1 CCDB-2009-03-001 Foreword This is a supporting document, intended to complement

More information

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original

More information

Setting Up an AS4 System

Setting Up an AS4 System INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu, www.entsog.eu,

More information

What an Architect Needs to Know

What an Architect Needs to Know Corporate Technology What an Architect Needs to Know Experiences from the Siemens Curriculum for Engineers Frank Buschmann Siemens AG Corporate Technology Systems Architecture and Platforms Copyright Siemens

More information

3SL. Requirements Definition and Management Using Cradle

3SL. Requirements Definition and Management Using Cradle 3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification

More information

SAMSUNG SDS FIDO Server Solution V1.1 Certification Report

SAMSUNG SDS FIDO Server Solution V1.1 Certification Report KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised

More information

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

3C05: Unified Software Development Process

3C05: Unified Software Development Process 3C05: Unified Software Development Process 1 Unit 5: Unified Software Development Process Objectives: Introduce the main concepts of iterative and incremental development Discuss the main USDP phases 2

More information

Software Design Principles and Guidelines

Software Design Principles and Guidelines Design Principles and Guidelines Overview CS 342: Object-Oriented Software Development Lab Software Design Principles and Guidelines David L. Levine Christopher D. Gill Department of Computer Science Washington

More information

A Software Engineering Model for Mobile App Development

A Software Engineering Model for Mobile App Development APPENDIX C A Software Engineering Model for Mobile App Development As we mentioned early in the book (see Chapter 1), to successfully develop a mobile software solution you should follow an engineering

More information

Enterprise Architecture: Practical Guide to Logical Architecture

Enterprise Architecture: Practical Guide to Logical Architecture Objecteering Practical Guides Enterprise Architecture: Practical Guide to Logical Architecture Author: Version: 1.0 Copyright: Softeam Softeam Consulting Team Supervised by Philippe Desfray Softeam 21

More information

Chapter 4 Software Lifecycle and Performance Analysis

Chapter 4 Software Lifecycle and Performance Analysis Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

How small and medium-sized enterprises can formulate an information security management system

How small and medium-sized enterprises can formulate an information security management system How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and

More information