-
1
-
-
0033702592
-
Transforming out Timing Leaks
-
J. Agat. Transforming out Timing Leaks. In Proc. POPL '00, pages 40-53.
-
Proc. POPL '00
, pp. 40-53
-
-
Agat, J.1
-
3
-
-
84941163141
-
Preventing timing leaks through transactional branching instructions
-
G. Barthe, T. Rezk, and M. Warnier. Preventing Timing Leaks Through Transactional Branching Instructions. In Proc. QAPL '05.
-
Proc. QAPL '05
-
-
Barthe, G.1
Rezk, T.2
Warnier, M.3
-
5
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative Information Flow, Relations and Polymorphic Types. J. Log. Comput., 18(2):181-199, 2005.
-
(2005)
J. Log. Comput.
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
0033725594
-
Information flow analysis in a discrete-time process algebra
-
R. Focardi, R. Gorrieri, and F. Martinelli. Information Flow Analysis in a Discrete-Time Process Algebra. In Proc. CSFW '00, pages 170-184.
-
Proc. CSFW '00
, pp. 170-184
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
8
-
-
24644477761
-
Bridging language-based and process calculi security
-
LNCS 3829
-
\8. R. Focardi, S. Rossi, and A. Sabelfeld. Bridging Language-Based and Process Calculi Security, In Proc. FoSSaCS '05, LNCS 3829, pages 299-315.
-
Proc. FoSSaCS '05
, pp. 299-315
-
-
Focardi, R.1
Rossi, S.2
Sabelfeld, A.3
-
9
-
-
2442507870
-
Abstract non-interference: Parameterizing non-interference by abstract interpretation
-
R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing non-interference by abstract interpretation. In Proc. POPL'04, pages 186-197.
-
Proc. POPL'04
, pp. 186-197
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
10
-
-
33745473816
-
Timed abstract non-interference
-
LNCS 3829
-
R. Giacobazzi and I. Mastroeni. Timed Abstract Non-interference. In Proc. FORMATS'05, LNCS 3829, pages 289-303.
-
Proc. FORMATS'05
, pp. 289-303
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
11
-
-
0025432462
-
CCS expressions, finite state processes, and three problems of equivalence
-
P. Kanellakis and S. Smolka. CCS Expressions, Finite State Processes, and Three Problems of Equivalence. Information and Computation, 86:43-68, 1990.
-
(1990)
Information and Computation
, vol.86
, pp. 43-68
-
-
Kanellakis, P.1
Smolka, S.2
-
12
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
LNCS 1109
-
P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proc. CRYPTO '96, LNCS 1109, pages 104-113.
-
Proc. CRYPTO '96
, pp. 104-113
-
-
Kocher, P.C.1
-
13
-
-
33750239565
-
Timing-sensitive information flow analysis for synchronous systems
-
ETH Zürich
-
B. Köpf and D. Basin, Timing-Sensitive Information Flow Analysis for Synchronous Systems. Technical Report 526, ETH Zürich, 2006.
-
(2006)
Technical Report
, vol.526
-
-
Köpf, B.1
Basin, D.2
-
14
-
-
33745678531
-
Eliminating implicit information leaks by transformational typing and unification
-
LNCS 3866
-
B. Köpf and H. Mantel. Eliminating implicit information leaks by transformational typing and unification. In In Proc. FAST'05, LNCS 3866, pages 42-62, 2006.
-
(2006)
Proc. FAST'05
, pp. 42-62
-
-
Köpf, B.1
Mantel, H.2
-
15
-
-
84948775168
-
Quantifying information flow
-
G. Lowe. Quantifying Information Flow. In Proc. CSFW '02, pages 18-31.
-
Proc. CSFW '02
, pp. 18-31
-
-
Lowe, G.1
-
16
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. D. McLean. A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions. In Proc. IEEE Symp. on Security and Privacy '94, pages 79-93.
-
Proc. IEEE Symp. on Security and Privacy '94
, pp. 79-93
-
-
McLean, J.D.1
-
18
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
LNCS 3860
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: the Case of AES. In Proc. CT-RSA '06, LNCS 3860, pages 1-20.
-
Proc. CT-RSA '06
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
19
-
-
0023566630
-
Three partition refinement algorithms
-
R. Paige and R. E. Tarjan. Three Partition Refinement Algorithms. SIAM J. Comput., 6(16):973-989, 1987.
-
(1987)
SIAM J. Comput.
, vol.6
, Issue.16
, pp. 973-989
-
-
Paige, R.1
Tarjan, R.E.2
-
20
-
-
0013225410
-
A review of worst-case execution-time analysis
-
P. Puschner and A. Burns. A Review of Worst-Case Execution-Time Analysis. Real-Time Systems, 18(2/3): 115-128, 2000.
-
(2000)
Real-time Systems
, vol.18
, Issue.2-3
, pp. 115-128
-
-
Puschner, P.1
Burns, A.2
-
22
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proc. CSFW '00, pages 200-215.
-
Proc. CSFW '00
, pp. 200-215
-
-
Sabelfeld, A.1
Sands, D.2
-
23
-
-
0035276729
-
A PER model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands. A PER Model of Secure Information Flow in Sequential Programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
24
-
-
0345382713
-
Domain-specific codesign for embedded security
-
P. Schaumont and I. Verbauwhede. Domain-Specific Codesign for Embedded Security. IEEE Computer, 36(4):68-74, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.4
, pp. 68-74
-
-
Schaumont, P.1
Verbauwhede, I.2
-
26
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
G. Smith and D. Volpano. Secure Information Flow in a Multi-Threaded Imperative Language. In Proc. POPL '98, pages 355-364.
-
Proc. POPL '98
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
27
-
-
84941152431
-
Analyzing for absence of timing leaks in VHDL
-
to appear
-
T. Tolstrup and F. Nielson. Analyzing for Absence of Timing Leaks in VHDL. In Proc. WITS '06 (to appear).
-
Proc. WITS '06
-
-
Tolstrup, T.1
Nielson, F.2
-
29
-
-
0030673701
-
Eliminating covert flows with minimum typings
-
D. Volpano and G. Smith. Eliminating Covert Flows with Minimum Typings. In Proc. CSFW '97, pages 156-168.
-
Proc. CSFW '97
, pp. 156-168
-
-
Volpano, D.1
Smith, G.2
|