Μετάβαση στο κύριο περιεχόμενο
Σημαία της Ευρωπαϊκής Ένωσης

Application of attack potential to hardware devices with security boxes

Documents under this section present metrics to calculate the attack potential required by an attacker to effect an attack on ICT products of the technical domain “Hardware Devices with Security Boxes”.

  • Συμπληρωματική πληροφορία

Λεπτομέρειες

Part of collection
Ημερομηνία δημοσίευσης
31 Ιανουαρίου 2024 (Τελευταία επικαιροποίηση την/στις: 19 Δεκεμβρίου 2025)
Ημερομηνία δημοσίευσης
Οργανισμός της Ευρωπαϊκής Ένωσης για την Κυβερνοασφάλεια
Type of Document
  • State-of-the-art Documents
Certification Scheme
ICT Solution
  • Hardware, Software and Components

Περιγραφή

This state-of-the-art document supporting the EUCC scheme interprets the Common Criteria Methodology (CEM), based on evaluation experience in the technical domain “Hardware Devices with Security Boxes” and input from the related industry through the JIL Embedded Devices Subgroup (JEDS) of the SOG-IS1. 

It provides guidance metrics to calculate the attack potential required by an attacker to effect an attack on ICT products of the technical domain “Hardware Devices with Security Boxes”. The underlying objective is to aid in expressing the total effort required to mount a successful attack. This should be applied to the operational behaviour of such ICT product as defined in a related Security Target of the product under evaluation.

EUCC State-of-the-Art

Αρχεία

Applicable version

  • 16 ΔΕΚΕΜΒΡΊΟΥ 2025
EUCC_SotA_attack potential HDwSB v2 (final)

Archive

  • 29 ΑΠΡΙΛΊΟΥ 2024
Application of Attack Potential to hardware devices with security boxes v1.2