30 October-1 November 2018 | Hilton Amsterdam

Conference Presentations by Track

Jump to:    Plenary Presentations   |   Advances in CC   |   Meeting Customer Requirements   |   Updates from Schemes and iTCs   |   Assurance

Plenary Presentations

Day 1
30 Oct 2018

Security Certification in the Age of Digital Transformation (P10b)

Digital transformation is accelerating the evolution of software development paradigms towards “DevOps” models where software is quickly developed and frequently deployed. As a result, the historic approach of after-the-fact security...
Read More
Eric Baize

CCDB Update (P11a)

David Martin

CCUF Update (P11b)

Miguel Bañón
Fiona Pattinson

Panel: The revision of ISO/IEC 15408 , 18045 and the TR22216 (P11c)

This panel discussion with attending editors assigned to the revision of ISO/IEC 15408, ISO/IEC 18045 and TR 22216 will briefly present the progress of the revision and allow for Q&A...
Read More
Kwangwoo Lee
Elżbieta Andrukiewicz
Dietmar Bremser
Miguel Bañón
Tony Boswell
Carolina Lavatelli

Live Demonstration of IoT Device Hacking + Presentation (P12d)

SPECIAL PRESENTATION A lack of product security requirements leads to easily hack-able products. This presentation will show live demonstrations of hacking of IoT devices, and review some common issues that...
Read More
John Boggie
Eric Vetillard

Presentation of Common Criteria Certificates by National Schemes (P14a)

CC Product Developers will have the opportunity to receive their CC certificates from the national schemes during an official presentation ceremony during ICCC. Invitations to Recipients: Product developers will be...
Read More
Day 2
01 Nov 2018

Summary Panel Discussion: The EU Cybersecurity Act (P32a)

Synthesizing three days of information presented at this year’s ICCC, panelists from labs, regulators, schemes, and product developers will present a forward-looking discussion on anticipated affects of the EU Cybersecurity...
Read More
Thomas Ben
Chris Gow
Martin Chapman
Matthias Intemann

Advances in CC Track

Day 1
30 Oct 2018

Track Keynote: Why I Care About the Security of Your Car (A12a)

Traditionally verification in automotive was centered around safety, protection against unintentional problems. Now it is time to look at security, or how do we protect against intentional problems? We show...
Read More
Marc Witteman

Robustness Propagation Through Systems of Heterogeneous CC Components (A12b)

IoT systems become highly dynamic and configurable raising evaluation difficulties. They have multiple components with different robustness levels. Connect the components’ security functions during integration is essential. Our “Lego” methodology...
Read More
Mohamad Hajj

Common Criteria as Backbone of IoT Security Certification (A12c)

With a great variety of devices, new attack schemes, complex software, and limited security awareness, IoT represents a challenge for security certification. Traditional approaches remain suitable for the roots of...
Read More
Eric Vetillard
Georg Stütz

Why Composite Evaluations Fail (A13a)

The topic of this presentation is the current approach for composite evaluations (where a hardware platform is evaluated separately from the software running on the hardware) and its failure to...
Read More
Helmut Kurth

A Compositional Certification Methodology For a COTS-Based System (A13b)

The aim of this presentation is providing an overview of the compositional security certification methodology to be used in the scope of MILS (Multiple Independent Levels of Security) evaluations and...
Read More
Alvaro Ortega Chamorro
Sergey Tverdyshev

Evaluation of Distributed Products in the CC Paradigm (A13c)

Distributed products evaluated under the Common Criteria paradigm have their own set of unique challenges. The Network Device iTC has supported distributed TOEs since the release of Network Device Collaborative...
Read More
Richard West
Day 2
31 Oct 2018

Introducing the Partner Program Certification Concept (A20a)

The FIDO Alliance, a 250+ member association developing specifications and certification programs for simpler, stronger authentication, announced back in March 2018 the expansion of its certification program to include multi-level...
Read More
Roland Atoui

Basissicherheitszertifizierung (BSZ)—An Alternative Means to Achieve Assurance (A20b)

This session will present a new approach – BSZ – in the German scheme (comparable to CSPN in France) which aims at providing assurance while drastically reducing both time as...
Read More
Dr. Helge Kreutzmann

TEE Certification: Managing Risk for Digital Services (A20c)

GlobalPlatform will present the use of Common Criteria to build a Trusted Execution Environment (TEE) security scheme. The speech will cover; Lessons learnt within the TEE ecosystem, The latest evaluation...
Read More
Gil Bernabeu

Scaling Common Criteria to the Next Level (A21a)

The need for independent security evaluation is present everywhere. New markets, like IoT, medical and automotive look to existing standards, but are not easily convinced that CC is the path...
Read More
Dirk-Jan Out

Common? C’mon! (A21b)

Common? C’mon! Over the years, the CC have struggled to establish a common understanding of where the bars shall be positioned that products must clear for a certain certification level....
Read More
Gerald Krummeck

Multi Assurance Evaluations for Real Products (A21c)

We see more and more multi-component products and systems protecting different kinds of assets and requiring different levels of assurance (consumer devices, cars, sensor networks, etc.). Stakeholders demand suitable security...
Read More
Carolina Lavatelli
Georg Stütz

Working Harder: Doing Painful Things With cPPs (A22a)

An important part of the move to cPPs was to help us to ‘raise the bar’ and improve the ways that evaluation and certification address security needs of deployed systems....
Read More
Tony Boswell

Modular PPs: The Building Blocks of Tomorrow (A22b)

The concept of PP-Modules was added to the CC in 2017. The first PP-Modules are just now being written and published for public consumption. As a new concept, vendors and...
Read More
Justin Fisher

How Much Decomposition is Too Much, The Debate Between Complete PPs and PP-Configurations (A22c)

Today the MDFPP (as an example) is a fairly cohesive set if requirements about a device evaluation, but NIAP has started to break it into smaller components (basically a Base-PP...
Read More
Brian Wood

Full Common Criteria Statistics Report with CC Scraper (A23a)

Obtaining good and accurate statistics is a nightmare in CC because of the reduced features of Common Criteria portal. For this reason, CC scraper has been developed. This tool analyses...
Read More
Javier Tallon

Next-Generation Tooling to Develop Protection Profiles, Automate Security Target Generation, and Support Evaluation Activity Reporting (A23b)

The speakers will showcase tooling that is freely available to the Common Criteria community on GitHub at https://github.com/commoncriteria. Major contributions include: (1) Development of a formally-defined XML schema that provides...
Read More
Jeffrey Blank
Jason Bourdette
Kevin Gallicchio
Day 3
01 Nov 2018

Connected Cars. What About Security? (A30a)

Nowadays, the car landscape includes a wide number of technology improvements focused on creating an easier, more comfortable, secure and safe driving experience. Some of these improvements could be all...
Read More
Ignacio Aldarabi Carrillo

Panel Discussion: Emerging Issues Between Hardware and Software Evaluations (A30b)

Description to come.
Shawn Geddis
Dag Stroman
John Boggie
Helmut Kurth
Dirk-Jan Out

Quantum Key Distribution—A New Target for CC Evaluation (A31a)

Quantum Key Distribution (QKD) provides a solution to expand a short but pre-shared key to establish a sufficiently long key enjoying information theoretic security. The key can then be used...
Read More
Ye Teng
Jiajun Ma
Hongsong Shi
Wei Wei

Guide for Evaluator in CC Evaluation: Tips and Tricks Malaysia Lab Style (A31b)

Common Criteria has been known for many years as the platform for developers, sponsor, labs, certification body and consumers to exchange ideas, working together, standardized processes and most of all,...
Read More
Ahmad Dahari Jarno

Impact of Technical Decisions on On-Going Evaluations Conforming to NDcPP (A31c)

Are Common Criteria certified products more robust? Is it possible that lingering effects of evaluation affect products in the short or medium timeframe? This presentation will cover the results from...
Read More
Nithya Rachamadugu

Meeting Customer Requirements

Day 1
30 Oct 2018

Continuous Mobile Application Compliance Using Government Standards (M12b)

DHS S&T will demonstrate its latest research that is shaping how enterprise organizations can leverage NIAP and other government standards for continuous automated assurance and compliance. The goal is to...
Read More
Vincent Sritapan
Angelos Stavrou

Adopting Common Criteria Methodology and Strategies in Malaysia Critical National Information Infrastructure (CNII) (M12c)

To adopt Common Criteria Methodology in Malaysia CNII, the following goals have been identified: Establish risk based assurance levels to support procurement; Develop standard security requirements for use in the...
Read More
Muzamir Mohamad
Ahmad Zuraimi bin Mohamad

Regulating IT Market with Common Criteria Certifications (M13a)

Even though Common Criteria Standard is the unique formal evaluation methodology for IT Security Evaluations, it’s also a strong tool to regulate the IT market mainly on procurements of governments....
Read More
Mehmet Cakir

Using Common Criteria for Procurement: International Procurement Initiatives (M13b)

The acquisition of an IT security product handling national or sensitive information must be preceded by a verification process warranting that the security mechanisms implemented in the product are adequate...
Read More
Jose Ruiz Gualda
Day 2
31 Oct 2018

Reconciling Security Vulnerabilities within the Common Criteria (M20a)

Maintaining the security of your product is crucial for every company, and a predominant part is the response of security vulnerabilities. Within the new engineering trends, such as Agile principles,...
Read More
Fabien Deboyser

Hypervisor Security—Panel Discussion (M20b)

Hypervisor security is at the core of public, hybrid and private clouds. As of now NIAP has a rudimentary hypervisor protection profile. Known techniques such as separate address space for...
Read More
Andrew Cousins
Alicia Squires
Fritz Bollmann
Tony Boswell
Michael Grimm
Ravi Jagannathan

Connected Cars. Security Certification Schemes. (M21a)

Smart Cars can be defined as systems providing connected, added-value features in order to enhance car users’ experience or improve car safety & security. Basically the smart car architecture consists...
Read More
Jose Emilio Rico

Protection Profiles for Smart Home Appliances (M21b)

Two new Common Criteria Protection Profiles to model security functionality of home use IoT devices will be motivated and their contents presented. A modular approach is taken in terms of...
Read More
Arnold Abromeit

Expressing Minimum Security Requirements for Smart Meters in a Protection Profile (M21c)

ESMIG represents European companies that provide products, information technology and services for multi-commodity metering, display and management of energy consumption and production at consumer premises. ESMIG have produced a set...
Read More
Tony Boswell

An Evaluation Methodology with Assurance Levels for Privacy-by-Design (M22a)

The rapid development of the Internet of Things is putting the quest for privacy on center stage. For example, the Dutch First Chamber blocked smart metering roll-out in 2009 due...
Read More
Quang-Huy Nguyen

PP v/s EAL: Where Does Security Assurance Reside? (M22b)

Over the last few years Common Criteria has gone through a major change, some would say an upheaval. With the move to PP/cPP based exact conformance paradigm, two distinct schools...
Read More
Terrie Diaz
Ashit Vora

Verification of Cryptographic Security Functionality in NIAP CCEVS (M23a)

NIAP-approved Protection Profiles specify assurance activities intended to verify cryptographic security functionality. This presentation will provide details of NIAP’s collaboration with TCs, iTCs, the CCDB Crypto Working Group, and the...
Read More
Dianne Hale

Ensuring Good Entropy Sources is Not a Random Act (M23b)

In the realm of government certification schemes, entropy sources are closely scrutinized via their design documents, quality justifications, and health-checks. Government security validation programs, such as FIPS 140-2 and Common...
Read More
Kelvin Desplanque
Rumman Mahmud

TLS 1.3, the Real Trusted Channel (M23c)

The establishment of secure communication is very common in products that are CC evaluated. However, sometimes, these channels are not as secure as expected, presenting vulnerabilities that can be exploited...
Read More
Guillermo Garcia Molina

Updates from Schemes and iTCs

Day 1
30 Oct 2018

Track Keynote: How Europe’s Cyber Security Act and CCRA Can Be Best Friends (U12a)

Currently Europe implements a Cyber Security Act (CSA) which amongst others sets up a European IT-Security certification framework. It is more than an educated guess that the first implementation of...
Read More
Matthias Intemann

Brexit, the EU Cyber Security Act, and Product Assurance in UK and the EU—An Update (U12b)

Following on from a presentation at ICMC 2018, this presentation will provide an update on progress with Brexit, the development of ENISA under the EU cyber security act; and the...
Read More
Simon Milford

Cybersecurity Act: On the Route of a European Union Cybersecurity Certification System (U12c)

On 13 September 2017, the European Commission (through the Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on ENISA, the “EU Cybersecurity Agency”, and repealing Regulation...
Read More
Stefano Bracco

IPSA: An Adaptation of Common Criteria for Malaysian Local Market (U13a)

Malaysian Common Criteria Evaluation and Certification (MyCC) scheme was developed in 2006. Since then a number of 65 products had been certified under the scheme. However, the local industry has...
Read More
Zarina Musa
Norahana Salimin

Panel Discussion: The Why and How of Using CC in Private Schemes (U13b)

This panel discussion will explore the reasons why entities are setting up private schemes while still using the Common Criteria as a standard—their experiences and lessons learned.
Gary Hemmings
Katsuya Shimoji
Regine Quentmeier
Gil Bernabeu
Francois Guerin
Day 2
31 Oct 2018

Netherlands Scheme Update (U20a)

Description to come.
Rob Huisman

NIAP Scheme Update (U20b)

Description to come.
Mary Baish

Scheme Update of Japan (U20c)

This presentation will provide an introduction to JISEC and IPA, JISEC achievements, revisions to procurement policy, and other topics.
Hitoshi Matsumoto

The Status of IT Security Evaluation and Standards in China—A Technical Perspective (U21a)

The booming development of information technology in China calls for the application of effective and efficient solutions for security evaluation similar to what occurs in the western world. Over the...
Read More
Yan Liu
Baofeng Zhang

The Russian IT Security Certification Scheme: Current Status and New Trends (U21b)

This presentation is dedicated to the Russian IT Security Certification Scheme. The presenters will briefly describe the history and structure of the Scheme, provide statistics on certification including vulnerability asessement...
Read More
Vitaly Varenitsa

Update from ISCI WG (U21c)

This presentation will give an overview of what the ISCI group is currently working on. This will include the harmonization of ALC including MSSR 2 and the STAR report. Process...
Read More
John Boggie

Common Criteria Crypto Working Group (U22a)

Description to come.
Frank Grefrath
Mary Baish

SOG-IS Crypto WG: Objectives, Achievements and Perspectives (U22b)

The SOG-IS Cryptographic WG was established in 2014 by SOG-IS MC. The task is to develop a harmonised SOG-IS Crypto Evaluation Scheme (SCES). In the SCES, a cryptographic evaluation of...
Read More
Thomas Hesselmann

Cryptographic Module Users Forum (CMUF) Update (U22c)

The Cryptographic Module Users Forum (CMUF) and specifically CMUF Working Groups are actively involved with the CMVP and focused on improving and evolving the FIPS 140-2 validations to meet industry...
Read More
Matt Keller

When cPPs Grow Up: The Challenges of Maintenance (U23a)

Releasing the first version of a cPP is not the end of the story—it is the beginning of a maintenance process that is even more challenging. Errors need to be...
Read More
Michael Vogel

Towards Collaborative Protection Profiles for Biometric Systems (U23b)

This presentation will introduce the biometrics security iTC that was established during 2016, the current structure of the working group and the main challenges addressed since its origin. Security evaluation...
Read More
Julien Bringer

Test Automation Best Practices for CC (U23c)

The introduction of prescriptive test requirements in Common Criteria Protection Profiles has provided an opportunity to shift from traditional manual testing methods to an automated approach. The CCUF Test Automation...
Read More
Lachlan Turner
Day 3
01 Nov 2018

Hard Copy Device Technical Community Update (U30a)

Description to come.
Brian Smithson
Alan Sukert

JEDS—A Community for the Evaluation and Certification of Embedded Devices (U30b)

JEDS, the JIWG Embedded Devices Subgroup, addresses the Common Criteria evaluation and certification of embedded devices. That includes e.g. payment terminals, tachograph vehicle units, smart meters, taxi meters, access control...
Read More
Jürgen Blum

Reusing ALC Activities—Looking for Efficiency in CC Evaluations: A Success Story (U30c)

The ISCI WG1 has developed during the last year a methodology that allows reusing ALC activities across different certification bodies. The ALC Reuse sub group has defined a new approach...
Read More
Gordon Caffrey
Rachel Menda-Shabat
Jose Ruiz Gualda

Network Device iTC Update (U31a)

Description to come.
Terrie Diaz

JTEMS—A Payment Scheme Independent Framework for POI Terminal Specific Security Evaluations Based on Common Criteria (U31b)

Past ICCC presentations have covered a Protection Profile dealing with security requirements for payment terminals, called POI (Point-of-Interaction) PP. This PP includes multiple EALs for different assets and a new...
Read More
Sven-Martin Hühne

Status and Overview of the DSC iTC (U31c)

Description to come.
Shawn Pinet

Assurance

Day 1
01 Nov 2018

Frequently Updated TOEs. Is Continued Assurance Possible? (S30a)

We live in a high-speed world. Some security products have to change daily, to provide reliable security functions. Operating systems have to apply patches for their and 3rd party libraries,...
Read More
Oleg Andrianov

Assurance at the Speed of Development (S30b)

The product assurance industry by and large has not kept pace with the innovation of product development, forcing governments to procure in some cases outdated technology from a limited set...
Read More
Jason Lawlor

Dealing with Patch Management in Common Criteria – Lesson Learned from Study Period in SC27 WG3 (S30c)

The responsibility for updating Common Criteria has been transferred from CCDB to SC27 WG3. Several major changes are in progress in ISO 15408 including addition of new topics as patch...
Read More
Francois Guerin

ePassport High Assurance Evaluations in a Timely Manner (S31a)

eMRTDs (epassports) are widely deployed throughout the world. These eMRTDs implement the well-known security requirements of ICAO. Over 5 of these were evaluated by the speaker’s organization, and these are...
Read More
Olaf Tettero
Monique Bakker

Hardware-Enabled AI for Embedded Security: Towards the Highest CC Evaluation Assurance Levels (S31b)

As chips become more and more connected it is important to ensure sufficient protection levels. Security within chips is therefore a hot topic. Incident detection and reporting is one novel...
Read More
Adrien Facon
Sylvain Guilley

ISCI-WG1: Lean CC and High Assurance—The Java Card Pre-Compiled Evidence Project (S31c)

Making the application of CC more lean to meet the current business requirements is an objective of ISCI-WG1. One of projects is the introducing of “Java Card pre-compiled evidence” intended...
Read More
Wouter Slegers
Monique Bakker