메뉴 건너뛰기




Volumn 141, Issue 1 SPEC. ISS., 2005, Pages 163-182

Timing aware information flow security for a javaCard-like bytecode

Author keywords

Bytecode; Covert channels; Information flow; Security

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); COMPUTER PROGRAMMING; DATA FLOW ANALYSIS; DATA PRIVACY; INFORMATION ANALYSIS; JAVA PROGRAMMING LANGUAGE;

EID: 28044445125     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.02.031     Document Type: Article
Times cited : (51)

References (17)
  • 2
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • Johan Agat. Transforming out timing leaks. In POPL, pages 40-53, 2000
    • (2000) POPL , pp. 40-53
    • Agat, J.1
  • 3
  • 4
    • 84944249026 scopus 로고    scopus 로고
    • Security types preserving compilation
    • Proceeding of VMCAI'04, Springer-Verlag
    • Gilles Barthe, Amitabh Basu, and Tamara Rezk Security types preserving compilation Proceeding of VMCAI'04 Lecture Notes in Computer Science volume 2937 2004 Springer-Verlag
    • (2004) Lecture Notes in Computer Science , vol.2937
    • Gilles, B.1    Amitabh, B.2    Tamara, R.3
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning A lattice model of secure information flow Communications of the ACM 19 5 May 1976 236 243
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 85024737217 scopus 로고    scopus 로고
    • Type-based information flow analysis for low-level languages
    • Naoki Kobayashi, and Keita Shirane Type-based information flow analysis for low-level languages English version in 3rd Asian Workshop on Programming Languages and Systems (APLAS'02), Japanese (full) version in Computer Software 20 2 2003 2 21 Iwanami Press
    • (2003) Computer Software , vol.20 , Issue.2 , pp. 2-21
    • Naoki, K.1    Keita, S.2
  • 9
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Proc. CRYPTO'96
    • P.C. Kocher Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems Proc. CRYPTO'96 Lecture Notes in Computer Science volume 1109 1996 104 113
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 10
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B.W. Lampson A note on the confinement problem Communications of the ACM 16 10 October 1973 613 615
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 11
    • 84956968251 scopus 로고    scopus 로고
    • Stack-based typed assembly language
    • Xavier Leroy Atsushi Ohori, 1998 Workshop on Types in Compilation, Springer-Verlag
    • Greg Morrisett, Karl Crary, Neal Glew, and David Walker Stack-based typed assembly language Xavier Leroy Atsushi Ohori 1998 Workshop on Types in Compilation Lecture Notes in Computer Science volume 1473 March 1998 Springer-Verlag 28 52 Kyoto, Japan
    • (1998) Lecture Notes in Computer Science , vol.1473 , pp. 28-52
    • Greg, M.1    Karl, C.2    Neal, G.3    David, W.4
  • 15
    • 24344486699 scopus 로고    scopus 로고
    • The Flow Caml System: Documentation and user's manual
    • Institut National de Recherche en Informatique et en Automatique (INRIA), July
    • Vincent Simonet. The Flow Caml System: documentation and user's manual. Technical Report 0282, Institut National de Recherche en Informatique et en Automatique (INRIA), July 2003
    • (2003) Technical Report , vol.282
    • Simonet, V.1
  • 16
    • 0031679133 scopus 로고    scopus 로고
    • A type system for java bytecode subroutines
    • January
    • Raymie Stata and Martin Abadi. A type system for java bytecode subroutines. In POPL, January 1998
    • (1998) POPL
    • Stata, R.1    Abadi, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.