Skip to main content
Logo
  • Supplementary information

Application of Attack Potential to Smartcards

Details

Part of collection
Publication date
31 January 2024 (Last updated on: 19 December 2025)
Author
European Union Agency for Cybersecurity
Type of Document
  • State-of-the-art Documents
Certification Scheme
ICT Solution
  • Hardware, Software and Components

Description

This state-of-the-art document supporting the EUCC scheme interprets the Common Criteria Methodology (CEM), based on smartcard CC evaluation experience and input from smartcard industry through the International Security Certification Initiative (ISCI) and the JIL Hardware Attacks Subgroup (JHAS) of the SOG-IS1. It provides guidance metrics to calculate the attack potential required by an attacker to effect an attack on a smartcard or similar device. 

The underlying objective is to aid in expressing the total effort required to mount a successful attack. This should be applied to the operational behaviour of a smartcard or similar device and not to applications specific only to hardware or software.

EUCC State-of-the-Art

Files

  • 16 DECEMBER 2025
EUCC_SotA_attack potential to smart cards v2 (final)
  • 29 APRIL 2024
Application of Attack Potential to Smartcards v1.2