Abstract
We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow analysis as required by the international standard Common Criteria. The goal of the analysis is to identify the entire information flow through the VHDL program. The result of the analysis is presented as a non-transitive directed graph that connects those nodes (representing either variables or signals) where an information flow might occur. We compare our approach to that of Kemmerer and conclude that our approach yields more precise results.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aho, A., Hopcroft, J., Ullman, J.: Data Structures and Algorithms. Addison-Wesley, Reading (1983)
Ashenden, P.J.: The Designer’s Guide to VHDL, 2nd edn. Morgan Kaufmann, San Francisco (2002)
Goossens, K.G.W.: Reasoning About VHDL Using Operational and Observational Semantics. In: Camurati, P.E., Eveking, H. (eds.) CHARME 1995. LNCS, vol. 987, pp. 311–327. Springer, Heidelberg (1995)
Haigh, J.T., Young, W.D.: Extending the Non-Interference Version of MLS for SAT. In: IEEE Symposium on Security and Privacy, pp. 232–239 (1986)
Hsieh, Y.-W., Levitan, S.P.: Control/Data-Flow Analysis for VHDL Semantic Extraction. Journal of Information Science and Engineering 14(3), 547–565 (1998)
Hymans, C.: Checking Safety Properties of Behavioral VHDL Descriptions by Abstract Interpretation. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 444–460. Springer, Heidelberg (2002)
IEEE inc. IEEE Standard VHDL Language Reference Manual. IEEE, Los Alamitos (1988)
McHugh, J.: Covert Channel Analysis. In: Handbook for the Computer Security Certification of Trusted Systems (1995)
Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)
Nielson, F., Nielson, H.R., Seidl, H.: A Succinct Solver for ALFP. Nordic Journal of Computing 9(4), 335–372 (2002)
Nielson, F., Nielson, H.R., Sun, H., Buchholtz, M., Hansen, R.R., Pilegaard, H., Seidl, H.: The Succinct Solver Suite. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 251–265. Springer, Heidelberg (2004)
Nielson, H.R., Nielson, F.: Semantics with Applications - A Formal Introduction. John Wiley & Sons, Chichester (1992)
International Standards Organisation. Common Criteria for information technology security (CC). ISO/IS 15408 Final Committee Draft, version 2.0. (1998)
Rushby, J.: Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International (December 1992)
Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications 21(1), 5–19 (2003)
Thirunarayan, K., Ewing, R.L.: Structural Operational Semantics for a Portable Subset of Behavioral VHDL-93. FMSD 18(1), 69–88 (2001)
Weeks, B., Bean, M., Rozylowicz, T., Ficke, C.: Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report, National Security Agency (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tolstrup, T.K., Nielson, F., Nielson, H.R. (2005). Information Flow Analysis for VHDL. In: Malyshkin, V. (eds) Parallel Computing Technologies. PaCT 2005. Lecture Notes in Computer Science, vol 3606. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11535294_8
Download citation
DOI: https://doi.org/10.1007/11535294_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28126-9
Online ISBN: 978-3-540-31826-2
eBook Packages: Computer ScienceComputer Science (R0)