메뉴 건너뛰기




Volumn 153, Issue 2 SPEC. ISS., 2006, Pages 33-55

Preventing Timing Leaks Through Transactional Branching Instructions

Author keywords

Non interference; Program transformation; Security; Semantics; Timing leaks

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; DATA PROCESSING; INFORMATION DISSEMINATION; QUERY LANGUAGES; SECURITY OF DATA; SEMANTICS; TIME VARYING SYSTEMS;

EID: 33646392466     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.10.031     Document Type: Article
Times cited : (52)

References (18)
  • 2
    • 33646430362 scopus 로고    scopus 로고
    • J. Agat. Transforming out Timing Leaks in Practice, chapter II from [3]. Department of Computing Science Chalmers University of Technology and Göteborg University, September 2000
  • 3
    • 33646413210 scopus 로고    scopus 로고
    • J. Agat. Type Based Techniques for Covert Channel Elimination and Register Allocation. Ph thesis, Department of Computing Science Chalmers University of Technology and Göteborg University, SE-412 96 Göteborg, Sweden, December 2000
  • 5
    • 33646435132 scopus 로고    scopus 로고
    • A. Banerjee and D. Naumann. Stack-Based Access Control for Secure Information Flow. Journal of Functional Programming, 200x. Special Issue on Language-Based Security, To appear
  • 6
    • 4944265699 scopus 로고    scopus 로고
    • Secure Information Flow by Self-Composition
    • Foccardi R. (Ed), IEEE Press
    • Barthe G., D'Argenio P., and Rezk T. Secure Information Flow by Self-Composition. In: Foccardi R. (Ed). Proceedings of CSFW'04 (2004), IEEE Press 100-114
    • (2004) Proceedings of CSFW'04 , pp. 100-114
    • Barthe, G.1    D'Argenio, P.2    Rezk, T.3
  • 8
    • 25844442786 scopus 로고    scopus 로고
    • ESC/Java2: Uniting ESC/Java and JML
    • Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices. Barthe G., Burdy L., Huisman M., Lanet J.-L., and Muntean T. (Eds), Springer-Verlag
    • Cok D.R., and Kiniry J.R. ESC/Java2: Uniting ESC/Java and JML. In: Barthe G., Burdy L., Huisman M., Lanet J.-L., and Muntean T. (Eds). Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices. LNCS volume 3362 (2004), Springer-Verlag 108-128
    • (2004) LNCS , vol.3362 , pp. 108-128
    • Cok, D.R.1    Kiniry, J.R.2
  • 9
  • 10
    • 28044445125 scopus 로고    scopus 로고
    • Timing Aware Information Flow Security for a JavaCard-like Bytecode
    • First Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE) proceedings. Spoto F. (Ed) ELsevier
    • Hedin D., and Sands D. Timing Aware Information Flow Security for a JavaCard-like Bytecode. In: Spoto F. (Ed). First Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE) proceedings. ENTCS (2005) 149-166 ELsevier
    • (2005) ENTCS , pp. 149-166
    • Hedin, D.1    Sands, D.2
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-helman, rsa, dss, and other systems
    • Advances in Cryptology - CRYPTO'96. Koblitz N. (Ed), Springer-Verlag
    • Kocher P.C. Timing attacks on implementations of diffie-helman, rsa, dss, and other systems. In: Koblitz N. (Ed). Advances in Cryptology - CRYPTO'96. LNCS volume 1109 (1996), Springer-Verlag 104-113
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 13
    • 0015672289 scopus 로고
    • A note on the Confinement Problem
    • Lampson B.W. A note on the Confinement Problem. Communications of the ACM 16 10 (1973) 613-615
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 14
    • 33646429272 scopus 로고    scopus 로고
    • S. Lecomte, G. Grimaud, and D. Donsez. Implementation of Transactional Mechanisms for Open SmartCard. In GEMPLUS Developer Conference, 1999
  • 16
    • 33646432551 scopus 로고    scopus 로고
    • J.E.B. Moss. Nested Transactions: An Approach to Reliable Distributed Computing. PhD thesis, MIT, 1981


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.