A tool for data scraping and analysis of security certificates from Common Criteria and FIPS 140-2/3 frameworks
Project description
Sec-certs
A tool for data scraping and analysis of security certificates from Common Criteria and FIPS 140-2/3 frameworks.
Papers
Two publications accompany this project:
[!NOTE]
- Janovsky, A., Jancar, J., Svenda, P., Chmielewski, Ł., Michalik, J., & Matyas, V. (2024). sec-certs: Examining the security certification practice for better vulnerability mitigation. Computers & Security, 143. https://doi.org/10.1016/j.cose.2024.103895
- Janovsky, A., Chmielewski, Ł., Svenda, P., Jancar, J., Matyas, V. (2024). Chain of Trust: Unraveling References Among Common Criteria Certified Products. In: Pitropakis, N., Katsikas, S., Furnell, S., Markantonakis, K. (eds) ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology, vol 710. Springer, Cham. https://doi.org/10.1007/978-3-031-65175-5_14
Installation
Use Docker with docker pull seccerts/sec-certs or just pip install -U sec-certs && python -m spacy download en_core_web_sm. For more elaborate description, see docs.
Usage
There are two main steps in exploring the world of security certificates:
- Data scraping and data processing all the certificates
- Exploring and analysing the processed data
For the first step, we currently provide CLI. For the second step, we provide simple API that can be used directly inside our Jupyter notebook or locally, together with a fully processed datasets that can be downloaded.
More elaborate usage is described in docs/quickstart. Also, see example notebooks either at GitHub or at docs. From docs, you can also run our notebooks in Binder.
Data scraping
Run sec-certs cc all for Common Criteria processing, sec-certs fips all for FIPS 140 processing.
Data analysis
Most probably, you don't want to fully process the certification artifacts by yourself. Instead, you can use our results and explore them as a data structure. An example snippet follows. For more, see example notebooks. Tip: these can be run with Binder from our docs.
from sec_certs.dataset import CCDataset
dset = CCDataset.from_web() # now you can inspect the object, certificates are held in dset.certs
df = dset.to_pandas() # Or you can transform the object into Pandas dataframe
dset.to_json(
'./latest_cc_snapshot.json') # You may want to store the snapshot as json, so that you don't have to download it again
dset = CCDataset.from_json('./latest_cc_snapshot.json') # you can now load your stored dataset again
# Get certificates with some CVE
vulnerable_certs = [x for x in dset if x.heuristics.related_cves]
df_vulnerable = df.loc[~df.related_cves.isna()]
# Show CVE ids of some vulnerable certificate
print(f"{vulnerable_certs[0].heuristics.related_cves=}")
# Get certificates from 2015 and newer
df_2015_and_newer = df.loc[df.year_from > 2014]
# Plot distribution of years of certification
df.year_from.value_counts().sort_index().plot.line()
Authors
This work is being done at CRoCS MUNI by Adam Janovsky, Jan Jancar, Petr Svenda, Jiri Michalik, Lukasz Chmielewski and other contributors. This work was supported by the Internal grant agency of Masaryk University, CZ.02.2.69/0.0/0.0/19_073/0016943.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file sec_certs-0.3.1.tar.gz.
File metadata
- Download URL: sec_certs-0.3.1.tar.gz
- Upload date:
- Size: 5.8 MB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.8
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3fdf1be9b630c3998edf46229be0773927195f66ce8da0477322d339ec49540b
|
|
| MD5 |
c15682d4ff89597085d1e63506439250
|
|
| BLAKE2b-256 |
419f4e316db0b50a8bab2635b962a5b793fc9e8ed3c3f73307a0285262c800fd
|
Provenance
The following attestation bundles were made for sec_certs-0.3.1.tar.gz:
Publisher:
release.yml on crocs-muni/sec-certs
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
sec_certs-0.3.1.tar.gz -
Subject digest:
3fdf1be9b630c3998edf46229be0773927195f66ce8da0477322d339ec49540b - Sigstore transparency entry: 171013234
- Sigstore integration time:
-
Permalink:
crocs-muni/sec-certs@443d38c9cf6d6e76c6667484a185839dd821fd11 -
Branch / Tag:
refs/tags/0.3.1 - Owner: https://github.com/crocs-muni
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@443d38c9cf6d6e76c6667484a185839dd821fd11 -
Trigger Event:
release
-
Statement type:
File details
Details for the file sec_certs-0.3.1-py3-none-any.whl.
File metadata
- Download URL: sec_certs-0.3.1-py3-none-any.whl
- Upload date:
- Size: 716.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.8
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
158b7423ee73d6a773e48e2bad8631867e8120dc7c4c6a0c1fbea643f7a28907
|
|
| MD5 |
7a4b7a376714f34a05e63ef3143bbaa7
|
|
| BLAKE2b-256 |
4e38bfd534ca449439a7cbce66e513dde422115f9899b24952bc8c464b98e983
|
Provenance
The following attestation bundles were made for sec_certs-0.3.1-py3-none-any.whl:
Publisher:
release.yml on crocs-muni/sec-certs
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
sec_certs-0.3.1-py3-none-any.whl -
Subject digest:
158b7423ee73d6a773e48e2bad8631867e8120dc7c4c6a0c1fbea643f7a28907 - Sigstore transparency entry: 171013237
- Sigstore integration time:
-
Permalink:
crocs-muni/sec-certs@443d38c9cf6d6e76c6667484a185839dd821fd11 -
Branch / Tag:
refs/tags/0.3.1 - Owner: https://github.com/crocs-muni
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@443d38c9cf6d6e76c6667484a185839dd821fd11 -
Trigger Event:
release
-
Statement type: