Abstract
We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cerone, A., Milne, G.J.: A methodology for the formal analysis of asynchronous micropipelines. In: Proceedings of the Third International Conference on Formal Methods in Computer-Aided Design, pp. 246–262. Springer, Heidelberg (2000)
de Moura, L., Owre, S., Rueß, H., Rushby, J., Shankar, N., Sorea, M., Tiwari, A.: SAL 2. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol. 3114, pp. 496–500. Springer, Heidelberg (2004)
Furedi, Z., Kurshan, R.P.: Minimal length test vectors for multiple-fault detection. Theor. Comput. Sci. 315(1), 191–208 (2004)
Graves, J.: Cryptographic device. Technical report, Defence Signals Directorate (2003)
Jackson, D.: Structuring Z specifications with views. ACM Trans. Softw. Eng. Methodol. 4(4), 365–389 (1995)
The Common Criteria Project Sponsoring Organisations. Common criteria for information technology security evaluation. Technical Report Standard 15408, 2.1 edition, ISO/IEC (1999)
Rae, A.J., Fidge, C.J.: Identifying critical components during information security evaluations. Journal of Research and Practice in Information Technology (2005) (accepted for publication)
Rae, A.J., Fidge, C.J.: Information flow analysis for fail-secure devices. The Computer Journal 48(1), 17–26 (2005)
Spanoudakis, G., Finkelstein, A., Emmerich, W.: Viewpoints 96: international workshop on multiple perspectives in software development (sigsoft 96) workshop report. SIGSOFT Softw. Eng. Notes,  22(1), 39–41 (1997)
Zwolinski, M.: Digital system design with VHDL, 2nd edn. Pearson Education, London (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
McComb, T., Wildman, L. (2005). SIFA: A Tool for Evaluation of High-Grade Security Devices. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_20
Download citation
DOI: https://doi.org/10.1007/11506157_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)