Analyzing security properties at the interface between HW & SW