메뉴 건너뛰기




Volumn , Issue , 2004, Pages 129-140

Increased information flow needs for high-assurance composite evaluations

Author keywords

Common criteria; Composite evaluation; Covert channels; High assurance; Smart cards

Indexed keywords

COMMERCIALLY LICENCED EVALUATION FACILITIES (CLEF); COMPOSITE EVALUATION; COVERT CHANNELS; EVALUATION TECHNICAL REPORT (ETR);

EID: 4544388201     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWIA.2004.1288043     Document Type: Conference Paper
Times cited : (4)

References (50)
  • 1
    • 0001314320 scopus 로고
    • Verification of the IBM RISC System/6000 by a dynamic biased pseudo-random test program generator
    • Aharon Aharon, Ayal Bar-David, Barry Dorfman, Emanuel Gofman, Moshe Leibowitz, and Victor Schwartzburd. Verification of the IBM RISC System/6000 by a dynamic biased pseudo-random test program generator. IBM Systems Journal, 30(4):527-538, 1991.
    • (1991) IBM Systems Journal , vol.30 , Issue.4 , pp. 527-538
    • Aharon, A.1    Bar-David, A.2    Dorfman, B.3    Gofman, E.4    Leibowitz, M.5    Schwartzburd, V.6
  • 4
    • 0003837824 scopus 로고    scopus 로고
    • Technical report, Compaq Computer Corporation, October
    • Alpha architecture handbook. Technical report, Compaq Computer Corporation, October 1998.
    • (1998) Alpha Architecture Handbook
  • 7
    • 4544321216 scopus 로고    scopus 로고
    • Application of attack potential to smartcards
    • Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
    • Application of attack potential to smartcards. Technical Report Version 1.1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/aapsc11.pdf.
    • (2002) Technical Report Version 1.1
  • 8
    • 0020087234 scopus 로고
    • Architecture management for ensuring software compatibility in the VAX family of computers
    • February
    • Dileep Bhandarkar. Architecture management for ensuring software compatibility in the VAX family of computers. Computer, 15(2):87-93, February 1982.
    • (1982) Computer , vol.15 , Issue.2 , pp. 87-93
    • Bhandarkar, D.1
  • 9
    • 4544370627 scopus 로고    scopus 로고
    • MULTOS version 3 on Hitachi H8/3112 integrated circuit card
    • UK IT Security Evaluation and Certification Scheme, Certification Body, PO Box 152, Cheltenham, UK, 13 September
    • M. D. Brown. MULTOS version 3 on Hitachi H8/3112 integrated circuit card. Technical Report UK ITSEC Scheme Certification Report No. P130, UK IT Security Evaluation and Certification Scheme, Certification Body, PO Box 152, Cheltenham, UK, 13 September 1999.
    • (1999) Technical Report UK ITSEC Scheme Certification Report No. P130 , vol.P130
    • Brown, M.D.1
  • 11
    • 4544280563 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation: Supplement: Vulnerability analysis and penetration testing
    • Common Criteria Interpretation Management Board, July
    • Common criteria for information technology security evaluation: Supplement: Vulnerability analysis and penetration testing. Technical Report CCIBM-2002-07-001, Version 0.68, Common Criteria Interpretation Management Board, July 2002. URL: http://web.archive.org/web/20030507065423/http://www.commoncriteria.org/ review_docs/docs/2002-07-001.pdf.
    • (2002) Technical Report CCIBM-2002-07-001, Version 0.68
  • 12
    • 4544291832 scopus 로고
    • DOD 5200.28-STD, National Computer Security Center, Washington, DC, December
    • Department of defense trusted computer system evaluation criteria. DOD 5200.28-STD, National Computer Security Center, Washington, DC, December 1985. URL: http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.pdf.
    • (1985)
  • 13
    • 4544237580 scopus 로고    scopus 로고
    • Application support architecture for a high-performance, programmable secure coprocessor
    • Crystal City, VA, 18-21 October
    • Joan Dyer, Ron Perez, Sean Smith, and Mark Lindemann. Application support architecture for a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference, Crystal City, VA, 18-21 October 1999. URL: http://csrc.ncsl.nist.gov/nissc/1999/proceeding/papers/p16.pdf.
    • (1999) 22nd National Information Systems Security Conference
    • Dyer, J.1    Perez, R.2    Smith, S.3    Lindemann, M.4
  • 14
    • 4544269213 scopus 로고    scopus 로고
    • ETR-lite for composition
    • Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
    • ETR-lite for composition. Technical Report Version 1.1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/etrli11.pdf.
    • (2002) Technical Report Version 1.1
  • 15
    • 4544236977 scopus 로고    scopus 로고
    • ETR-lite for composition: Annex a composite smartcard evaluation: Recommended best practice
    • Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March
    • ETR-lite for composition: Annex a composite smartcard evaluation: Recommended best practice. Technical Report Version 1.1, Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March 2002. URL: http://www.bsi.de/zertifiz/zert/interpir/etrlia12.pdf.
    • (2002) Technical Report Version 1.1
  • 16
    • 21644455797 scopus 로고    scopus 로고
    • Functionality classes and evaluation methodology for physical random number generators
    • Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 September
    • Functionality classes and evaluation methodology for physical random number generators. Technical Report AIS 31, Version 1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 September 2001. URL: http://www.bsi.bund.de/zertifiz/zert/interpr/ais31e.pdf.
    • (2001) Technical Report AIS 31, Version 1
  • 17
    • 4544280564 scopus 로고    scopus 로고
    • Guidance for smartcard evaluation
    • Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March
    • Guidance for smartcard evaluation. Technical Report Version 1.1, Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/scgui11.pdf.
    • (2002) Technical Report Version 1.1
  • 18
    • 4544230378 scopus 로고
    • Hardware subverter for the Honey well 6180
    • The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, December
    • Kevin B. Hennigan. Hardware subverter for the Honey well 6180. Technical Report ESD-TR-76-352, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, December 1976.
    • (1976) Technical Report , vol.ESD-TR-76-352
    • Hennigan, K.B.1
  • 23
    • 4544256110 scopus 로고
    • 22 May
    • Information Processing Center, Massachusetts Institute of Technology, Cambridge, MA. Summary of the H6180 Processor, 22 May 1973.
    • (1973) Summary of the H6180 Processor
  • 24
    • 4544336845 scopus 로고    scopus 로고
    • Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements
    • International Organization for Standardization, Genève
    • Information technology - security techniques - evaluation criteria for IT security - part 3: Security assurance requirements. Technical Report ISO/IEC15408-3, International Organization for Standardization, Genève, 1999.
    • (1999) Technical Report , vol.ISO-IEC15408-3
  • 26
    • 3042716872 scopus 로고
    • Multics security evaluation: Vulnerability analysis
    • HQ Electronic Systems Division, Hanscom AFB, MA, USA, June
    • Paul A. Karger and Roger R. Schell. Multics security evaluation: Vulnerability analysis. Technical Report ESD-TR-74-193, Vol. II, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June 1974. URL: http://csrc.nist.gov/publications/history/karg74.pdf.
    • (1974) Technical Report , vol.2 ESD-TR-74-193
    • Karger, P.A.1    Schell, R.R.2
  • 27
    • 84948969398 scopus 로고    scopus 로고
    • Thirty years later: Lessons from the Multics security evaluation
    • Las Vegas, NV, 9-13 December
    • Paul A. Karger and Roger R. Schell. Thirty years later: Lessons from the Multics security evaluation. In Proceedings of the 18th Annual Computer Security Applications Conference, pages 119-126, Las Vegas, NV, 9-13 December 2002. URL: http://www.acsac.org/2002/papers/classic-multics.pdf.
    • (2002) Proceedings of the 18th Annual Computer Security Applications Conference , pp. 119-126
    • Karger, P.A.1    Schell, R.R.2
  • 30
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • Santa Barbara, CA, August. Lecture Notes in Computer Science, Springer Verlag
    • P. Kocher, J. Jaffe, and B. Jun. Differential power analysis: Leaking secrets. In Proceedings of Crypto '99, pages 388-397, Santa Barbara, CA, August 1999. Lecture Notes in Computer Science, Vol. 1666, Springer Verlag.
    • (1999) Proceedings of Crypto '99 , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 32
    • 84859015303 scopus 로고    scopus 로고
    • Soft tempest: Hidden data transmission using electromagnetic emanations
    • Portland, OR, April 1998. Lecture Notes in Computer Science, Springer Verlag
    • Markus G. Kuhn and Ross J. Anderson. Soft tempest: Hidden data transmission using electromagnetic emanations. In Information Hiding: Second International Workshop, IH'98, pages 124-142, Portland, OR, April 1998. Lecture Notes in Computer Science, Vol. 1525, Springer Verlag. URL: http://www.cl.cam.ac.uk/mgk25/ih98-tempest.pdf.
    • Information Hiding: Second International Workshop, IH'98 , vol.1525 , pp. 124-142
    • Kuhn, M.G.1    Anderson, R.J.2
  • 35
    • 4544370629 scopus 로고
    • The VAX 8800 microarchitecture
    • February
    • Sudhindra N. Mishra. The VAX 8800 microarchitecture. Digital Technical Journal, (4):20-33, February 1987.
    • (1987) Digital Technical Journal , Issue.4 , pp. 20-33
    • Mishra, S.N.1
  • 36
    • 0014929268 scopus 로고
    • Hardware aspects of secure computing
    • Atlantic City, NJ, 5-7 May. AFIPS Press
    • Lee M. Molho. Hardware aspects of secure computing. In 1970 Spring Joint Computer Conference, pages 135-141, Atlantic City, NJ, 5-7 May 1970. AFIPS Press.
    • (1970) 1970 Spring Joint Computer Conference , pp. 135-141
    • Molho, L.M.1
  • 37
    • 4544232432 scopus 로고    scopus 로고
    • Philips Electronics North America Corporation. XA User Guide, 1998. URL: http://www-us.semiconductors.philips.com/acrobat/various/XA_USER_GUIDE_1.pdf.
    • (1998) XA User Guide
  • 39
    • 0035246794 scopus 로고    scopus 로고
    • On the role of formal methods in security
    • 28 February
    • Josyula R. Rao. On the role of formal methods in security. Information Processing Letters, 77(2-4):209-212, 28 February 2001.
    • (2001) Information Processing Letters , vol.77 , Issue.2-4 , pp. 209-212
    • Rao, J.R.1
  • 41
    • 4544282487 scopus 로고    scopus 로고
    • Information security: Science, pseudoscience, and flying pigs
    • New Orleans, LA, 10-14 December. IEEE Computer Society
    • Roger R. Schell. Information security: Science, pseudoscience, and flying pigs. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 205-216, New Orleans, LA, 10-14 December 2001. IEEE Computer Society. URL: http://www.acsac.org/invited-essay/essays/2001-schell.pdf.
    • (2001) Proceedings of the 17th Annual Computer Security Applications Conference , pp. 205-216
    • Schell, R.R.1
  • 42
    • 0003584029 scopus 로고
    • Security requirements for cryptographic modules
    • National Institute of Standards and Technology, Gaithersburg, MD, 11 January
    • Security requirements for cryptographic modules. Technical Report FIPS PUB 140-1, National Institute of Standards and Technology, Gaithersburg, MD, 11 January 1994. URL: http://csrc.nist.gov/publications/fips/fips140-1/fips1401.pdf.
    • (1994) Technical Report , vol.FIPS PUB 140-1
  • 43
    • 1242295745 scopus 로고    scopus 로고
    • Security requirements for cryptographic modules
    • Change Notice 1, National Institute of Standards and Technology, Gaithersburg, MD, 10 October
    • Security requirements for cryptographic modules. Technical Report FIPS PUB 140-2, Change Notice 1, National Institute of Standards and Technology, Gaithersburg, MD, 10 October 2001. URL: http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf.
    • (2001) Technical Report , vol.FIPS PUB 140-2
  • 44
    • 4544336846 scopus 로고
    • TCB subsets for incremental evaluation
    • Oakland, CA, 7-11 December. American Institute of Aeronautics and Astronautics
    • William R. Shockley and Roger R. Schell. TCB subsets for incremental evaluation. In Proceedings of the Third Aerospace Conference on Computer Security, pages 131-139, Oakland, CA, 7-11 December 1987. American Institute of Aeronautics and Astronautics. URL: http://www.acsac.org/secshelf/papers/tcbsubsets.pdf.
    • (1987) Proceedings of the Third Aerospace Conference on Computer Security , pp. 131-139
    • Shockley, W.R.1    Schell, R.R.2
  • 45
    • 4544236364 scopus 로고    scopus 로고
    • Smartcard IC platform protection profile
    • developed by Atmel Smart Card ICs, Hitachi Europe Ltd., Infineon Technologies AG, and Philips Semiconductors, registered and certified by Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
    • Smartcard IC platform protection profile. Technical Report BSI-PP-0002-2001, developed by Atmel Smart Card ICs, Hitachi Europe Ltd., Infineon Technologies AG, and Philips Semiconductors, registered and certified by Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2001. URL: http://www.bsi.bund.de/cc/pplist/ssvgpp01.pdf.
    • (2001) Technical Report , vol.BSI-PP-0002-2001
  • 46
    • 4544247466 scopus 로고    scopus 로고
    • ST-lite
    • Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
    • ST-lite. Technical Report Version 1.1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/stlite11.pdf.
    • (2002) Technical Report Version 1.1
  • 47
    • 0031639694 scopus 로고    scopus 로고
    • Functional verification of a multiple-issue, out-of-order, super-scalar Alpha processor - The DEC Alpha 21264 microprocessor
    • San Francisco, CA, June. Association for Computing Machinery
    • Scott Taylor, Michael Quinn, Darren Brown, Nathan Dohm, Scot Hildebrandt, James Huggins, and Carl Ramey. Functional verification of a multiple-issue, out-of-order, super-scalar Alpha processor - the DEC Alpha 21264 microprocessor. In Proceedings of the 35th Annual Conference on Design Automation, pages 638-644, San Francisco, CA, June 1998. Association for Computing Machinery.
    • (1998) Proceedings of the 35th Annual Conference on Design Automation , pp. 638-644
    • Taylor, S.1    Quinn, M.2    Brown, D.3    Dohm, N.4    Hildebrandt, S.5    Huggins, J.6    Ramey, C.7
  • 48
    • 4544273303 scopus 로고    scopus 로고
    • The application of CC to integrated circuits
    • Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
    • The application of CC to integrated circuits. Technical Report Version 1.2, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/hwiccc12.pdf.
    • (2002) Technical Report Version 1.2
  • 49
    • 7244234916 scopus 로고
    • Trusted database management system interpretation of the TCSEC (TDI)
    • National Computer Security Center, Fort George G. Meade, MD, April
    • Trusted database management system interpretation of the TCSEC (TDI). Technical Report NCSC-TG-021, National Computer Security Center, Fort George G. Meade, MD, April 1991. URL: http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-021.ps.
    • (1991) Technical Report , vol.NCSC-TG-021


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.