Partners

Latest news

No news at this moment

Publications

Press Release

Commissariat à l’Energie Atomique, France

An Introduction to VeriFast for Java

Jochen Burghardt, Hans Werner Pohl

A Trusted Virtual Security Module

Ronald Toegl, Florian Reimair, Martin Pirker

Partners

Trusted-labs

Trusted-labs

Further Information :

About Trusted-labs

Trusted Labs S.A.S. is an independent company dedicated to security evaluation and consulting, with more than 10 years of experience. Trusted Labs has a recognized expertise in the domain of embedded security such as smartcards, terminals and smart phones, essentially in the banking, telecom, government and transport sectors.
The main consulting activities concern Common Criteria, FIPS, risk analysis, Formal Methods, model-based testing, development of proof-of-concept pilots. The certification support services includes development of Protection Profile, new certification approaches, EAL6&7 methodologies and development of formal evidences. The Evaluation Laboratory evaluates the security and compliance of products (cards & terminals) and solutions for vendors and operators and is specialized in the functional and security validation for mobile NFC applications. It is accredited for EMVCo security evaluations and AFSCM (French Mobile Contactless Association).

Role in the Project

The role of TLABS to the STANCE project is to contribute to three main phases of the project, the definition of the security requirements and rules, security properties to be verified/validated using static analysis tools for mobile code and the methodology for security analysis of the targeted systems, in particular in the Common Criteria context. TLABS has developed a range of tools to statically analyze the security properties of Java applications for connected devices (card, terminals, etc). TLABS security people will bring to the STANCE project their expertise of security guidelines rules development, handbooks for developers, protection profile writing and practical analysis and security evaluation of mobile applications and platform and in Formal Methods, security evaluation and Common Criteria evaluations.

Key Personnel