AIセキュリティポータル K Program
Chain of trust: Unraveling references among Common Criteria certified products
Share
Abstract
With 5394 security certificates of IT products and systems, the Common Criteria for Information Technology Security Evaluation have bred an ecosystem entangled with various kind of relations between the certified products. Yet, the prevalence and nature of dependencies among Common Criteria certified products remains largely unexplored. This study devises a novel method for building the graph of references among the Common Criteria certified products, determining the different contexts of references with a supervised machine-learning algorithm, and measuring how often the references constitute actual dependencies between the certified products. With the help of the resulting reference graph, this work identifies just a dozen of certified components that are relied on by at least 10% of the whole ecosystem -- making them a prime target for malicious actors. The impact of their compromise is assessed and potentially problematic references to archived products are discussed.
Product certification: IT security certification scheme Common Criteria (CC), version 4.1
Bundesamt für Sicherheit in der Informationstechnik
Published: 2023
ISO/IEC 15408 Information technology — Security techniques — Evaluation criteria for IT security
Common Criteria
Published: 2022
Assurance continuity: CCRA requirements
Common Criteria Recognition Arrangement Management Committee
Published: 2012
Operating procedures: Certificate validity
Common Criteria Recognition Arrangement Management Committee
Published: 2021
On the topology of package dependency networks: a comparison of three programming language ecosystems
Decan, A., Mens, T., Claes, M.
Published: 2016
A quantitative analysis of Common Criteria certification practice
Kaluvuri, S.P., Bezzi, M., Roudier, Y.
Published: 2014
Demystifying the vulnerability propagation and its evolution via dependency trees in the NPM ecosystem
Liu, C., Chen, S., Fan, L., Chen, B., Liu, Y., Peng, X.
Published: 2022
The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli
Nemec, M., Sýs, M., Svenda, P., Klinec, D., Matyas, V.
Published: 2017
Common Criteria: Origins and Overview
Tierney, J., Boswell, T.
Published: 2017
Small world with high risks: A study of security threats in the npm ecosystem
Zimmermann, M., Staicu, C., Tenny, C., Pradel, M.
Published: 2019
Share