In this work, we would like to address the development and evaluation of tools to elaborate the timing behavior of processor designs. The properties Confidentiality, Integrity (, Availability) and Authenticity (CI[A]A) need to be protected. And in this work, we focus on vulnerabilities to the confidentiality in hardware systems and how they can be exploited using software. We will develop tools that can detect the vulnerabilities in software descriptions.