|
|
|
|
|
|
|
|
|
|
|
|
|
¨ |
High
assurance cannot be established only by
|
|
|
|
unconstrained
search for vulnerabilities
|
|
|
¨ |
High
assurance requires
|
|
|
|
– |
Security
requirements that aren’t intrinsically
|
|
|
|
vulnerable
to threats in the intended environment
|
|
|
|
– |
Proof
that implementation meets requirements
|
|
|
|
– |
Search
for vulnerabilities introduced by the specific
|
|
|
|
implementation
of the requirements, constrained by the
|
|
|
assumptions
about the intended environment
|
|
|
|
– |
Minimal
reliance on competence of specific evaluators
|
|