This report asks one practical question: how far can one concrete smartphone TOE (Samsung Galaxy S25 Ultra, model SM-S938) be mapped to Common Criteria and SSCD PP requirements for local signing?

Core point: strong signature-control requirements can be enforced on the user device and do not inherently require delegating signing control to a remote trust-service path or a specialized local gadget.

This document does not claim qualification. It shows what is covered, what is still uncovered, and what evidence is still required for ST/SAR evaluation and the formal eIDAS path.

Scope and Method

Scope: Full local-QSCD readiness mapping for one concrete device TOE (Samsung Galaxy S25 Ultra, model SM-S938), aligned to the complete applicable SSCD PP Part 2/Part 5 clause set, required assignments/refinements, and evidence expectations for ST/SAR evaluation in the formal eIDAS path [[PPSSCD2]] [[PPSSCD5]] [[PPAPPNOTE]] [[CCPART3]] [[CEMR5]] [[EIDAS910]] [[EIDAS2016650]].

Coverage Target:

Inclusion Rule:

A mapping item is included only when it can be tied to a formal requirement source and mapped to a concrete phone-side control or a clearly stated evidence gap.

Assessment Focus:

Method:

Section 5 uses one format for each mapped item: CRITERIA (formal clause), COVERED (what current S25 controls handle), and UNCOVERED (what still needs closure evidence).

The goal is practical: show what is already defensible with current public evidence, what is technically plausible but not yet evidenced, and what remains required for formal evaluation and certification path work across the full applicable local-QSCD claim scope [[PPSSCD2]] [[PPSSCD5]] [[CCPART3]] [[CEMR5]].

Terminology and Abbreviations

Definitions for the terms and abbreviations used in this report. Formal source pointers are given at clause level where possible: eIDAS Article 25, Article 26, Annex II, SSCD PP Part 2, Section 10.2.2 through 10.2.6, SSCD PP Part 5, Section 9.1.1 through 9.1.4, CC Part 3 assurance classes, and CEM evaluator activities.

TOE (Target of Evaluation)
The evaluated security boundary for one concrete product claim, as defined in the Common Criteria model and claimed in the ST [[CCPART1]] [[CCPART3]].
CC (Common Criteria)
ISO/CC security evaluation framework used for security functional requirements and assurance requirements [[CCPART1]] [[CCPART2]] [[CCPART3]].
PP (Protection Profile)
Reusable requirement baseline for a technology class under the CC model [[CCPART1]].
SSCD (Secure Signature Creation Device)
The CEN SSCD protection-profile family used here for local-signing clause mapping (Part 2 functional set and Part 5 refinements) [[PPSSCD2]] [[PPSSCD5]].
ST (Security Target)
Product-specific security claim package for one TOE, evaluated under ASE and related assurance classes [[CCPART1]] [[CCPART3]].
SAR (Security Assurance Requirement)
Assurance component set that defines required evidence and evaluation depth [[CCPART3]].
CEM (Common Evaluation Methodology)
Evaluator activity methodology for CC assurance components [[CEMR5]].
eIDAS
EU legal framework for electronic identification and trust services (Regulation (EU) No 910/2014, as amended), including Article 25, Article 26, and Annex II [[EIDAS910]] [[EIDAS2024]].
QSCD (Qualified Signature Creation Device)
Qualified signature-creation device concept and control obligations under eIDAS Annex II [[EIDAS910]].
local-QSCD
Report term for a local-device signing profile that keeps signature control and protected key use on the user device, while mapping the claim to eIDAS Annex II controls and SSCD PP clause families (Part 2 functional requirement clauses and Part 5 channel/auth refinements) with CC/CEM assurance evidence expectations; clause sources: eIDAS Annex II, SSCD PP Part 2, Section 10.2.2 through 10.2.6, SSCD PP Part 5, Section 9.1.1 through 9.1.4, CC Part 3, and CEM. [[EIDAS910]] [[PPSSCD2]] [[PPSSCD5]] [[CCPART3]] [[CEMR5]].
ETSI
European standards body publishing the trust-service standards used in this report (for example EN 319 401, EN 319 411-1/-2, EN 319 412-5, TS 119 431-1, TS 119 432) [[ETSIEN319401]] [[ETSIEN3194111]] [[ETSIEN3194112]] [[ETSIEN3194125]] [[ETSI1194311]] [[ETSI119432]].
SCD (Signature Creation Data)
Signature-creation key material protected by the TOE in SSCD PP clauses for generation, use, and protection [[PPSSCD2]].
SVD (Signature Verification Data)
Public verification data associated with SCD in SSCD PP key-lifecycle and transfer clauses [[PPSSCD2]].
DTBS (Data To Be Signed)
Exact input data object intended for signature operations in SSCD/ETSI signing flows [[PPSSCD5]] [[ETSI119432]].
DTBS/R (Data To Be Signed Representation)
Representation of DTBS shown/processed in signing protocols and policy/security requirements [[ETSI119432]] [[ETSI1194311]].
SCA (Signature Creation Application)
Application-side component interacting with the TOE for DTBS and signature activation/sign command exchange [[PPSSCD5]] [[ETSI119432]].
VAD (Verification/Authentication Data)
Authentication data used in trusted path/channel flows before signing release in SSCD PP Part 5 [[PPSSCD5]].
Biometric
User-authentication factor verified by platform authentication before key use in hardware-backed keystore authorization flows [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].
PIN (Personal Identification Number)
Knowledge-factor authenticator used by platform authorization controls before protected signing operations [[ANDROIDKEYSTORE]].
TSF (TOE Security Functionality)
Security functionality inside the TOE boundary [[CCPART1]].
TEE (Trusted Execution Environment)
Isolated execution environment used by platform keystore paths for sensitive key operations [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].
StrongBox
Android hardware-backed keystore implementation class for high assurance key handling and key-use authorization enforcement [[ANDROIDKEYSTORE]].
KeyMint
Android secure key management component used by Keystore/StrongBox to enforce key authorization policies (purpose, mode, padding, digest, and related constraints) [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].
Knox Vault
Samsung hardware-backed security subsystem for key protection and related secure operations in mapped S25 claims [[KNOXVAULT]].
API (Application Programming Interface)
Interface boundary between components; in this report, especially SCA to signing-service/keystore invocation paths [[ETSI119432]] [[ANDROIDKEYSTORE]].
CA (Certificate Authority)
Certificate-issuing trust-service function under certificate-policy requirements in ETSI EN 319 411-1/-2 [[ETSIEN3194111]] [[ETSIEN3194112]].
QTSP (Qualified Trust Service Provider)
Trust service provider in the qualified eIDAS framework, with policy baseline alignment in ETSI EN 319 401 and EN 319 411-2 [[EIDAS910]] [[ETSIEN319401]] [[ETSIEN3194112]].
QCStatements
Qualified certificate statement extensions profiled in ETSI EN 319 412-5 [[ETSIEN3194125]].
FCS / FDP / FIA / FMT / FPT / FTP / SAR
CC family abbreviations used in SSCD PP requirement mapping and assurance evaluation context [[CCPART2]] [[CCPART3]] [[PPSSCD2]] [[PPSSCD5]].
FCS (Cryptographic Support)
CC family for cryptographic key management and cryptographic operations [[CCPART2]].
FDP (User Data Protection)
CC family for data access control and data integrity/protection rules [[CCPART2]].
FIA (Identification and Authentication)
CC family for identification and authentication timing, strength, and failure handling [[CCPART2]].
FMT (Security Management)
CC family for role definition, management functions, and management data controls [[CCPART2]].
FPT (Protection of the TSF)
CC family for TSF protection, tamper response, fail secure behavior, and self-test controls [[CCPART2]].
FTP (Trusted Channel/Path)
CC family for trusted communication paths/channels [[CCPART2]].
ADV (Development)
CC assurance class for architecture, design, implementation, and functional specification evidence [[CCPART3]].
AGD (Guidance Documents)
CC assurance class for preparative and operational guidance quality [[CCPART3]].
ALC (Life-cycle Support)
CC assurance class for configuration management, delivery, development-security, and tooling controls [[CCPART3]].
ASE (Security Target Evaluation)
CC assurance class for completeness and consistency of ST content and rationale [[CCPART3]].
ATE (Tests)
CC assurance class for developer and independent testing evidence [[CCPART3]].
AVA (Vulnerability Assessment)
CC assurance class for vulnerability analysis and penetration testing depth [[CCPART3]].
AVA_VAN.5 (Advanced Methodical Vulnerability Analysis)
CC component requiring high attack-potential vulnerability analysis and penetration testing, evaluated with CEM activities [[CCPART3]] [[CEMR5]].
CRITERIA
Report mapping label for the formal requirement clause (from SSCD PP and/or CC) being assessed [[PPSSCD2]] [[PPSSCD5]] [[CCPART2]] [[CCPART3]].
COVERED
Report mapping label for controls already mapped to the cited formal clause with current evidence references [[CCPART3]] [[CEMR5]].
UNCOVERED
Report mapping label for remaining claim gaps that still require ST assignments, evaluator evidence, or implementation closure [[CCPART3]] [[CEMR5]].

Legal and Standards Baseline

This report anchors its legal control model to eIDAS Annex II. Signature-creation data must stay confidential, practically unique, resistant to derivation and forgery, and usable only under signatory control. The data to be signed must also be shown before release so signing cannot occur with silent alteration [[EIDAS910]].

The technical baseline is SSCD PP Part 2 and Part 5, plus the QSCD application note, under the eIDAS standards-pointer path in Decision 2016/650. The evaluation method follows Common Criteria Part 1-3 and CEM [[PPSSCD2]] [[PPSSCD5]] [[PPAPPNOTE]] [[EIDAS2016650]] [[CCPART1]] [[CCPART2]] [[CCPART3]] [[CEMR5]].

ETSI standards are the service-layer comparison set: EN 319 401 for trusted systems, EN 319 411-1/-2 for certificate policy and qualified context, EN 319 412-5 for QCStatements, and TS 119 432 for the remote-signing protocol model [[ETSIEN319401]] [[ETSIEN3194111]] [[ETSIEN3194112]] [[ETSIEN3194125]] [[ETSI119432]] [[ETSI1194311]].

Phone-side evidence (Knox Vault, Android Keystore/KeyMint behavior, and Android attestation) supports three device claims: protected key boundary, controlled key lifecycle, and sign-release gating [[KNOXVAULT]] [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

What remains is service-level closure evidence: audited CA/QTSP policy controls, qualified-certificate process evidence, and protocol/interoperability test results. TS 119 432 defines protocol structure, but not the full signer-intent assurance stack [[ETSI119432]].

Illustration: Samsung Galaxy S25 Ultra TOE Boundary

TOE selected in this report: Samsung Galaxy S25 Ultra (model SM-S938), on stock Samsung firmware with trusted boot and attestation path intact [[SAMSUNGS25US]] [[ANDROIDATTEST]].

Samsung Galaxy S25 Ultra official product image. Samsung Knox Vault architecture image.
Official product and security-subsystem visuals used for this TOE mapping [[SAMSUNGS25US]] [[KNOXVAULT]].
Galaxy S25 Ultra local-signing TOE architecture Knox Vault - StrongBox key generation - non-exportable private key use - key destruction / invalidation - tamper and side-channel controls TrustZone / KeyMint path - trusted boot measurements - auth and key-access policy checks - fail-secure key operation gating - keystore API mediation One UI / system UI - display DTBS/R - collect user auth - user intent ceremony Signing app (SCA) - build canonical DTBS - call keystore sign API - verify returned signature
The full consumer phone is not automatically the evaluated TOE; the ST still must define exact security boundaries [[CCPART1]].

Common Criteria and PP Family Mapping to Galaxy S25 Ultra

This section maps Common Criteria and SSCD protection-profile families to concrete Samsung Galaxy S25 Ultra control points.

Format per criterion: CRITERIA (formal clause and source), COVERED (what S25 currently handles), and UNCOVERED (what still requires closure for conformity).

How to read this section: each card represents one requirement line from the SSCD PP set.

COVERED shows what can already be mapped to S25 controls. UNCOVERED shows what still needs implementation or evaluation evidence.

FCS (Cryptographic Support)

Focus: key generation, key destruction, and signing operations inside the trusted key boundary.

CRITERIA: Part 2 §10.2.2.1 FCS_CKM.1 - The TOE must generate SCD/SVD using specified algorithms and parameter sizes. [[PPSSCD2]]

COVERED: On S25, key generation is mapped to a hardware-backed Knox Vault StrongBox/KeyMint path, and key-use authorizations are set at key creation/import and enforced by secure key services (for example, purpose, mode, padding, digest, and algorithm/key-size support constraints) [[KNOXVAULT]] [[ANDROIDKEYSTORE]].

UNCOVERED: The ST still must define the exact approved profile (allowed algorithms, key sizes, and related assignments for this TOE claim), and evaluation evidence must show non-approved combinations are rejected [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.2.2 FCS_CKM.4 - The TOE must destroy key material according to a specified method. [[PPSSCD2]]

COVERED: On S25, key lifecycle control is mapped to hardware-backed Knox Vault StrongBox/KeyMint services where key deletion/invalidation removes key handles and prevents further key use through the secure keystore path [[KNOXVAULT]] [[ANDROIDKEYSTORE]].

UNCOVERED: The ST still must define the exact destruction claim (for example logical invalidation versus specific physical erasure semantics) and provide evaluation evidence that deleted key material is not recoverable, including residual-data verification tests [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.2.3 FCS_COP.1 - The TOE must perform the cryptographic signature operation with specified algorithms and parameters. [[PPSSCD2]]

COVERED: On S25, signing operations are mapped to hardware-backed keystore/KeyMint services, where private keys remain non-exportable and signing is invoked via secure key operations rather than raw key extraction [[KNOXVAULT]] [[ANDROIDKEYSTORE]].

UNCOVERED: The ST still must define the exact allowed signing profile (algorithm, key size/curve, digest, padding/mode) and provide evaluation evidence that non-approved signing configurations are rejected [[PPSSCD2]] [[CEMR5]].

FDP (User Data Protection)

Focus: access control and integrity rules for key material, signing operations, and DTBS handling.

CRITERIA: Part 2 §10.2.3.1 FDP_ACC.1/SCD/SVD_Generation - Access control for key generation objects. [[PPSSCD2]]

COVERED: key generation is policy-gated in Knox Vault/KeyMint keystore with trusted boot state checks [[KNOXVAULT]] [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: The ST and evaluation package still must publish the subject/object role-policy matrix used for generation access decisions [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.2 FDP_ACF.1/SCD/SVD_Generation - Attribute-based generation rules. [[PPSSCD2]]

COVERED: enforce key attributes and usage constraints in hardware-backed keystore policy objects [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: Public sources do not provide negative-authorization test results for attribute-rule enforcement; evaluator evidence still must show unauthorized combinations are rejected [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.3 FDP_ACC.1/SVD_Transfer - Access control for SVD transfer. [[PPSSCD2]]

COVERED: allow only public-key/certificate export via approved API endpoint; private key remains non-exportable in hardware [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: The ST still must define and test the exact conditions under which SVD export is allowed (for example enrollment/certification state bindings) [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.4 FDP_ACF.1/SVD_Transfer - Rules for SVD transfer decisions. [[PPSSCD2]]

COVERED: perform release checks on trusted boot state, key purpose, and authenticated app flow before SVD transfer [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: Explicit deny rules for untrusted channels still must be stated in the ST and backed by test evidence [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.5 FDP_ACC.1/Signature-creation - Access control on sign operation. [[PPSSCD2]]

COVERED: signing only in authenticated session, with key access controlled by Knox Vault/KeyMint path [[KNOXVAULT]] [[ANDROIDKEYSTORE]].

UNCOVERED: The ST still must define per-signature authorization semantics and show event-level enforcement in tests [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.6 FDP_ACF.1/Signature-creation - Attribute rules for sign operation. [[PPSSCD2]]

COVERED: enforce key purpose, auth freshness, and boot integrity state before sign execution [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: Public documentation does not provide conformance evidence that background/invisible signing requests are denied by default; this still requires ST + evaluator tests [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.7 FDP_RIP.1 - Residual information protection. [[PPSSCD2]]

COVERED: partially mapped through hardware-backed keystore isolation; explicit buffer-wipe evidence still needs ST test artifacts.

UNCOVERED: Memory-clearing behavior still requires explicit evaluator test artifacts for residual-data handling [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.8 FDP_SDI.2/Persistent - Persistent data integrity monitoring and action. [[PPSSCD2]]

COVERED: trusted boot and keystore integrity checks gate key usage and storage operations [[ANDROIDATTEST]] [[ANDROIDKEYSTORE]].

UNCOVERED: If anti-rollback protection is claimed for persistent security data, the ST still must define the mechanism and provide verification evidence [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.3.9 FDP_SDI.2/DTBS - DTBS integrity monitoring and action. [[PPSSCD2]]

COVERED: implement DTBS hash-binding in SCA and pass only canonicalized payloads to keystore sign API.

UNCOVERED: Canonical DTBS/R serialization and mismatch-handling rules still must be fixed in the ST and validated in tests [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 5 §9.1.2 FDP_UIT.1/DTBS - Integrity for DTBS data exchange path. [[PPSSCD5]]

COVERED: authenticated and integrity-protected SCA-to-TOE channel, with key attestation and signed request envelope where needed [[ANDROIDATTEST]] [[ANDROIDKEYSTORE]].

UNCOVERED: Where channel internals are opaque, envelope-level integrity protection and endpoint verification rules still must be fixed and tested in the evaluation package [[PPSSCD5]] [[CEMR5]].

FIA (Identification and Authentication)

Focus: when user identity and authentication are required before key use and signature release.

CRITERIA: Part 2 §10.2.4.1 FIA_UID.1 - User identification timing. [[PPSSCD2]]

COVERED: before protected key use, the signing ceremony can carry identity-relevant context from app/session state and device attestation signals [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: the ST still must define how identity context is bound to each signing transaction and provide evaluator evidence that mismatched context is rejected [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.4.2 FIA_UAU.1 - User authentication timing. [[PPSSCD2]]

COVERED: biometric/PIN gating before sign release can be mapped to a hardware-backed key-auth path using Knox Vault and Android keystore authorization controls [[KNOXVAULT]] [[ANDROIDKEYSTORE]].

UNCOVERED: for higher-risk signature classes, step-up authentication triggers and test results still must be defined in the evaluation package [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.4.3 FIA_AFL.1 - Authentication failure handling. [[PPSSCD2]]

COVERED: retry counters and authentication-freshness controls are available through platform authentication and Android keystore authorization policy [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: lockout thresholds, reset rules, and failure responses still must be specified as TSF-managed data and verified by evaluator tests [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 5 §9.1.1 FIA_UAU.1 refinement - Authentication flow adapted for trusted channel/VAD path. [[PPSSCD5]]

COVERED: trusted-path authentication for VAD entry can be mapped to the system-auth flow and hardware-backed key authorization path [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: the ST still must define trusted-path guarantees (channel binding, user-visible integrity properties, and failure handling) and provide test evidence for those guarantees [[PPSSCD5]] [[CEMR5]].

FMT (Security Management)

Focus: role separation, management functions, and policy control of security-relevant settings.

CRITERIA: Part 2 §10.2.5.1 FMT_SMR.1 - Maintain security roles. [[PPSSCD2]]

COVERED: the S25 stack provides managed policy and protected key-use controls that can host role separation at deployment/app policy level [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: the ST still must define explicit Admin vs Signatory role boundaries, and evaluator tests must show unauthorized role actions are rejected [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.2 FMT_SMF.1 - List TOE management functions. [[PPSSCD2]]

COVERED: key lifecycle and key-use authorization functions are available through Android keystore/KeyMint controls and hardware-backed enforcement paths [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: the ST still must enumerate the exact management-function set and complete required assignments from the PP application note set [[PPSSCD2]] [[PPAPPNOTE]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.3 FMT_MOF.1 - Restrict security function behavior management. [[PPSSCD2]]

COVERED: sign-enable behavior can be gated through managed policy and app/service authorization layers, with key-use enforcement in hardware-backed keystore controls [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: the ST still must define authorized subjects/operations and denial behavior, and evaluation evidence should include tamper-evident logs for enable/disable events [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.4 FMT_MSA.1/Admin - Admin management of security attributes. [[PPSSCD2]]

COVERED: admin-side certificate and keystore policy controls are mapped to managed policy and keystore controls [[KNOXVAULT]] [[ANDROIDKEYSTORE]].

UNCOVERED: authenticated admin-channel rules, approval workflow, and role-bound change control still must be specified in the ST and verified in evaluator tests [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.5 FMT_MSA.1/Signatory - Signatory management of security attributes. [[PPSSCD2]]

COVERED: signatory-facing controls can be implemented at app/service level while key-use constraints remain enforced in keystore policy objects [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: the ST still must define exactly which attributes a signatory may modify and provide user-visible policy transparency with evaluator test evidence [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.6 FMT_MSA.2 - Accept only secure attribute values. [[PPSSCD2]]

COVERED: Android keystore authorization parameters support constrained key-use policy values (for example purpose, digest, padding, and authentication requirements) [[ANDROIDKEYSTORE]].

UNCOVERED: the ST still must define the secure-value set for this TOE claim and provide tests showing weak/default-disallowed values are rejected [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.7 FMT_MSA.3 - Static attribute initialization. [[PPSSCD2]]

COVERED: key initialization can be mapped to secure defaults such as hardware backing, non-exportability, and authentication-gated use through keystore policy controls [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: the ST still must define required default attributes and provide evaluator evidence that insecure defaults cannot be introduced through management flows [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.8 FMT_MSA.4 - Attribute value inheritance rules. [[PPSSCD2]]

COVERED: policy layering can be used so derived contexts do not relax parent key-use constraints enforced by keystore authorization policy [[ANDROIDKEYSTORE]].

UNCOVERED: deterministic inheritance rules still must be specified in the ST, with evaluator tests showing no privilege weakening across context transitions [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.9 FMT_MTD.1/Admin - Admin TSF data management. [[PPSSCD2]]

COVERED: admin TSF updates can be routed through authenticated managed channels, with key-use policy enforcement anchored in hardware-backed keystore controls [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: the ST still must define dual-control semantics for critical admin changes and provide test evidence for approval enforcement and rollback behavior [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.5.10 FMT_MTD.1/Signatory - Signatory TSF data management. [[PPSSCD2]]

COVERED: signatory profile metadata can be managed at app/service layer while protected key material remains isolated in the hardware-backed keystore boundary [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: signed change records and tamper-evident audit history for signatory-managed TSF data still must be defined and verified in the evaluation package [[PPSSCD2]] [[CEMR5]].

FPT (Protection of the TSF)

Focus: protection of security functions against tamper, failure, and integrity compromise.

CRITERIA: Part 2 §10.2.6.1 FPT_EMSEC.1 (Part 5 names FPT_EMS.1) - Emanation resistance. [[PPSSCD2]], Part 5 naming note [[PPSSCD5]]

COVERED: map to Knox Vault components described as resistant to side-channel and fault attacks; PP0084 provides a public evaluation-profile anchor for related secure-component class claims [[KNOXVAULT]] [[BSIPP0084]].

UNCOVERED: the ST and evaluator package still must bind emanation claims to the exact TOE boundary, test method, and measured results; if full-phone evidence is weak, narrow scope to the evaluated secure component boundary [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.6.2 FPT_FLS.1 - Fail secure on failure. [[PPSSCD2]]

COVERED: trusted boot and attestation signals gate keystore operation; when integrity checks fail, protected key use is refused [[ANDROIDATTEST]] [[ANDROIDKEYSTORE]].

UNCOVERED: secure-failure state transitions and recovery behavior still must be defined in the ST and verified with evaluator tests [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.6.3 FPT_PHP.1 - Passive detection of physical attack. [[PPSSCD2]]

COVERED: Knox Vault documentation describes tamper detection hardware monitor and secure integrity-dependent behavior [[KNOXVAULT]].

UNCOVERED: measurable tamper-state outputs, trigger conditions, and response actions still must be specified and backed by evaluator evidence [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.6.4 FPT_PHP.3 - Resistance to physical attack scenarios. [[PPSSCD2]]

COVERED: Knox Vault subsystem is described as tamper-proof and resistant to probing, side-channel, and fault injection attack classes [[KNOXVAULT]].

UNCOVERED: the ST still must define the selected hardware SKU, claimed resistance scope, and evaluator test evidence for the attack classes in scope [[PPSSCD2]] [[CEMR5]].

CRITERIA: Part 2 §10.2.6.5 FPT_TST.1 - Self-test and integrity test functions. [[PPSSCD2]]

COVERED: trusted boot and integrity signaling provide startup validation hooks for security functions [[ANDROIDATTEST]] [[ANDROIDKEYSTORE]].

UNCOVERED: startup/runtime self-test coverage, fault handling, and integrity-test verdict behavior still must be documented and verified in the evaluator package [[PPSSCD2]] [[CEMR5]].

FTP (Trusted Channel/Path)

Focus: trusted communication paths for authentication data and data-to-be-signed.

CRITERIA: Part 5 §9.1.3 FTP_ITC.1/VAD - Trusted channel for VAD/auth path. [[PPSSCD5]]

COVERED: the system authentication path can be mapped to hardware-backed key-release gating via Android keystore authorization controls and Knox Vault enforcement boundaries [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: secure-attention and anti-overlay guarantees for VAD entry still must be explicitly defined in the ST and verified in evaluator tests [[PPSSCD5]] [[CEMR5]].

CRITERIA: Part 5 §9.1.4 FTP_ITC.1/DTBS - Trusted channel for DTBS path. [[PPSSCD5]]

COVERED: authenticated integrity-protected DTBS channel from SCA to TOE, verified with key attestation and payload binding controls [[ANDROIDATTEST]] [[ANDROIDKEYSTORE]].

UNCOVERED: the ST still must define binding rules between displayed DTBS hash and final sign command, with evaluator evidence that mismatch and substitution cases are rejected [[PPSSCD5]] [[CEMR5]].

SAR (ADV/AGD/ALC/ASE/ATE/AVA)

Focus: assurance-evidence families required to defend the mapped claim set under Common Criteria evaluation method depth; this assurance workstream applies to the SSCD Part 2 baseline and its Part 5 extension context [[PPSSCD2]] [[PPSSCD5]].

CRITERIA: ADV components in PP Part 2 assurance set: ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3. [[PPSSCD2]]

COVERED: this report defines a candidate TOE boundary and clause-level behavior mapping that can seed architecture and functional-spec evidence structure [[PPSSCD2]] [[CCPART3]].

UNCOVERED: evaluator-grade architecture, subsystem decomposition, complete external-interface specifications, and implementation-representation evidence still must be produced for the selected TOE boundary [[PPSSCD2]] [[CCPART3]] [[CEMR5]].

CRITERIA: AGD components in PP Part 2 assurance set: AGD_OPE.1, AGD_PRE.1. [[PPSSCD2]]

COVERED: operational assumptions and control intent are identified in the mapping narrative and closure tasks [[PPSSCD2]].

UNCOVERED: complete preparative and operational guidance packages (installation, secure configuration, key lifecycle operations, failure handling, and operator responsibilities) still must be authored and test-referenced [[PPSSCD2]] [[CCPART3]] [[CEMR5]].

CRITERIA: ALC components in PP Part 2 assurance set: ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1. [[PPSSCD2]]

COVERED: baseline secure-component and platform-security documentation can anchor lifecycle-support scoping for the claimed TOE boundary [[KNOXVAULT]] [[ANDROIDKEYSTORE]].

UNCOVERED: configuration-item inventory, CM system evidence, secure-delivery process, development-security controls, lifecycle model, and toolchain confidence evidence still must be provided as evaluator-verifiable artifacts [[PPSSCD2]] [[CCPART3]] [[CEMR5]].

CRITERIA: ASE components in PP Part 2 assurance set: ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1. [[PPSSCD2]]

COVERED: this report provides an initial structured claim map that can be converted into ST content with traceability from threat/problem statements to requirements and TOE summary specification [[PPSSCD2]] [[CCPART3]].

UNCOVERED: full ST package consistency, dependency closure, and assignment/refinement completion still must be finalized and evaluator-checked for the final claim scope [[PPSSCD2]] [[PPAPPNOTE]] [[CCPART3]] [[CEMR5]].

CRITERIA: ATE components in PP Part 2 assurance set: ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2. [[PPSSCD2]]

COVERED: section 5 identifies concrete control points and residual claims that can be turned into a structured conformance test plan [[PPSSCD2]].

UNCOVERED: full test design, coverage rationale, developer test evidence, and independent evaluator test results still must be produced across normal, failure, and abuse paths [[PPSSCD2]] [[CCPART3]] [[CEMR5]].

CRITERIA: AVA component in PP Part 2 assurance set: AVA_VAN.5. [[PPSSCD2]]

COVERED: high-risk attack classes and closure tasks are already identified (for example side-channel, fault injection, UI-path manipulation, and trusted-path abuse) as a basis for vulnerability-work planning [[PPSSCD2]] [[CCPART3]].

UNCOVERED: evaluator-grade vulnerability analysis and penetration-test campaign evidence at AVA_VAN.5 depth still must be executed for the final TOE boundary and claim set [[PPSSCD2]] [[CCPART3]] [[CEMR5]].

Cross-Family Closure Items

These are high-impact closure tasks that cut across multiple CC families.

CRITERIA: Trusted display proof for DTBS review before signing

COVERED: partial coverage exists through mapped FDP/FTP controls for integrity-protected DTBS transport and keystore-gated signing flows [[PPSSCD2]] [[PPSSCD5]] [[ANDROIDKEYSTORE]] [[ANDROIDATTEST]].

UNCOVERED: the ST still must define trusted-display/confirmation behavior and cryptographic binding between displayed DTBS hash and final sign command, with evaluator tests for mismatch/substitution rejection [[PPSSCD5]] [[CEMR5]].

CRITERIA: Strong physical/emanation evidence at full-phone scope

COVERED: partial coverage exists through mapped FPT controls and published secure-component claims for Knox Vault, with PP0084 as a public evaluation-profile anchor [[PPSSCD2]] [[KNOXVAULT]] [[BSIPP0084]].

UNCOVERED: full-phone emanation/physical claims still require explicit TOE-boundary definition and measured evaluator evidence; where evidence is weak, narrow scope to the minimal evaluated secure boundary in the ST [[PPSSCD2]] [[CEMR5]].

CRITERIA: Admin/signatory role separation on consumer OS

COVERED: partial coverage exists through mapped FMT policy/management controls and hardware-backed key-use enforcement paths [[PPSSCD2]] [[ANDROIDKEYSTORE]] [[KNOXVAULT]].

UNCOVERED: explicit Admin/Signatory role model, role-restricted management API semantics, and separation-of-duty test evidence still must be defined in the ST [[PPSSCD2]] [[CEMR5]].

CRITERIA: Opaque secure-channel internals in commodity stacks

COVERED: partial coverage exists through mapped FTP trusted-channel requirements and platform attestation/keystore integrity controls [[PPSSCD5]] [[ANDROIDATTEST]] [[ANDROIDKEYSTORE]].

UNCOVERED: explicit signed request/response wrapping, endpoint-binding rules, and attestation-verification behavior still must be specified and verified in evaluation evidence [[PPSSCD5]] [[CEMR5]].

CRITERIA: Insufficient AVA_VAN.5 depth evidence

COVERED: baseline vulnerability-analysis structure is provided by Common Criteria assurance components and CEM methodology [[CCPART3]] [[CEMR5]].

UNCOVERED: a pre-cert penetration plan for S25 still must be executed and evidenced for high-impact vectors (for example TEE escape, UI overlay, side-channel, and fault injection) to support AVA_VAN.5-level claims [[CCPART3]] [[CEMR5]].

Bottom Line

Samsung Galaxy S25 Ultra can be profiled toward local-QSCD behavior if the TOE boundary is strict around Knox Vault/keystore components, keys stay hardware-bound, trusted channels are explicit, and ST/SAR evidence is complete [[KNOXVAULT]] [[ANDROIDKEYSTORE]] [[PPSSCD2]] [[PPSSCD5]] [[CCPART3]] [[CEMR5]].

Given that technical baseline, pursuing recognition paths for regular user devices as QSCD-capable local-signing endpoints is worth prioritizing for decentralization and accessibility. This direction is further supported by unresolved remote-signing weaknesses documented in the companion report: https://z-base.github.io/rqscd-report/.