Belkin® Secure DVI KVM Switch, Secure KM Switch and
Secure Windowing KVM EAL 4 augmented ALC_FLR.3 Security Target
T.ROM_PROG
The TSF may be modified
by an attacker such that
code embedded in
reprogrammable ROMs is
overwritten, thus leading
to a compromise of the
separation‐enforcing
components of the code
and subsequent
compromise of the data
flowing through the TOE.
GROUP ID.
O.ROM
This Objective assures that TOE
software/firmware will be
protected against unauthorized
modification. Embedded software
must be contained in mask‐
programmed, fuse protected flash
or one‐time‐programmable read‐
only memory permanently attached
(non‐socketed) to a circuit
assembly.
important for DEVICES with bi‐
directional
communications
channels such as KEYBOARD and
POINTING DEVICES. Since many
PERIPHERALS
now
embedded microprocessors or
microcontrollers,
amounts of information may be
transferred from one COMPUTER
system to another, resulting in
compromise
of
information. An example of this
is transfer via the buffering
mechanism in many KEYBOARDS.
Further, the purpose of the TOE
is to share a set of PERIPHERALS
among multiple COMPUTERS.
Information transferred to/from
one SWITCHED COMPUTER is not
to be shared with any other
COMPUTER.
O.ROM
The
threat
of
(firmware)
embedded
reprogrammable
ROMs
mitigated by ensuring that the
ROMs used in the TSF to hold
embedded TSF data are not
physically able to be re‐
programmed. Thus, even if an
interface does exist to the ROM
containing the embedded TSF
code, high confidence can be
obtained that that code (stored
in the ROM) will remain
unchanged together with the
TOE security functions.
Rev. 1.01
have
significant
sensitive
software
in
is
Page | 32