Skip to main content

Information Flow Analysis for VHDL

  • Conference paper
Parallel Computing Technologies (PaCT 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3606))

Included in the following conference series:

Abstract

We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow analysis as required by the international standard Common Criteria. The goal of the analysis is to identify the entire information flow through the VHDL program. The result of the analysis is presented as a non-transitive directed graph that connects those nodes (representing either variables or signals) where an information flow might occur. We compare our approach to that of Kemmerer and conclude that our approach yields more precise results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aho, A., Hopcroft, J., Ullman, J.: Data Structures and Algorithms. Addison-Wesley, Reading (1983)

    MATH  Google Scholar 

  2. Ashenden, P.J.: The Designer’s Guide to VHDL, 2nd edn. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  3. Goossens, K.G.W.: Reasoning About VHDL Using Operational and Observational Semantics. In: Camurati, P.E., Eveking, H. (eds.) CHARME 1995. LNCS, vol. 987, pp. 311–327. Springer, Heidelberg (1995)

    Google Scholar 

  4. Haigh, J.T., Young, W.D.: Extending the Non-Interference Version of MLS for SAT. In: IEEE Symposium on Security and Privacy, pp. 232–239 (1986)

    Google Scholar 

  5. Hsieh, Y.-W., Levitan, S.P.: Control/Data-Flow Analysis for VHDL Semantic Extraction. Journal of Information Science and Engineering 14(3), 547–565 (1998)

    Google Scholar 

  6. Hymans, C.: Checking Safety Properties of Behavioral VHDL Descriptions by Abstract Interpretation. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 444–460. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. IEEE inc. IEEE Standard VHDL Language Reference Manual. IEEE, Los Alamitos (1988)

    Google Scholar 

  8. McHugh, J.: Covert Channel Analysis. In: Handbook for the Computer Security Certification of Trusted Systems (1995)

    Google Scholar 

  9. Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)

    MATH  Google Scholar 

  10. Nielson, F., Nielson, H.R., Seidl, H.: A Succinct Solver for ALFP. Nordic Journal of Computing 9(4), 335–372 (2002)

    MATH  MathSciNet  Google Scholar 

  11. Nielson, F., Nielson, H.R., Sun, H., Buchholtz, M., Hansen, R.R., Pilegaard, H., Seidl, H.: The Succinct Solver Suite. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 251–265. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Nielson, H.R., Nielson, F.: Semantics with Applications - A Formal Introduction. John Wiley & Sons, Chichester (1992)

    MATH  Google Scholar 

  13. International Standards Organisation. Common Criteria for information technology security (CC). ISO/IS 15408 Final Committee Draft, version 2.0. (1998)

    Google Scholar 

  14. Rushby, J.: Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International (December 1992)

    Google Scholar 

  15. Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications 21(1), 5–19 (2003)

    Article  Google Scholar 

  16. Thirunarayan, K., Ewing, R.L.: Structural Operational Semantics for a Portable Subset of Behavioral VHDL-93. FMSD 18(1), 69–88 (2001)

    MATH  Google Scholar 

  17. Weeks, B., Bean, M., Rozylowicz, T., Ficke, C.: Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report, National Security Agency (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tolstrup, T.K., Nielson, F., Nielson, H.R. (2005). Information Flow Analysis for VHDL. In: Malyshkin, V. (eds) Parallel Computing Technologies. PaCT 2005. Lecture Notes in Computer Science, vol 3606. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11535294_8

Download citation

  • DOI: https://doi.org/10.1007/11535294_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28126-9

  • Online ISBN: 978-3-540-31826-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics