We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
McComb, T., & Wildman, L. (2005). SIFA: A tool for evaluation of high-grade security devices. In Lecture Notes in Computer Science (Vol. 3574, pp. 230–241). Springer Verlag. https://doi.org/10.1007/11506157_20
Mendeley helps you to discover research relevant for your work.