Soc Security Verification Using Assertion-Based And Information Flow Tracking Techniques