메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 243-262

Timing-sensitive information flow analysis for synchronous systems

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; INFORMATION ANALYSIS; MATHEMATICAL MODELS; PARAMETER ESTIMATION; SYNCHRONOUS MACHINERY; TIMING DEVICES;

EID: 33750279149     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_16     Document Type: Conference Paper
Times cited : (15)

References (29)
  • 1
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out Timing Leaks
    • J. Agat. Transforming out Timing Leaks. In Proc. POPL '00, pages 40-53.
    • Proc. POPL '00 , pp. 40-53
    • Agat, J.1
  • 2
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • G. Barthe, P. D'Argenio, and T. Rezk. Secure Information Flow by Self-Composition. In Proc. CSFW '04, pages 100-114.
    • Proc. CSFW '04 , pp. 100-114
    • Barthe, G.1    D'Argenio, P.2    Rezk, T.3
  • 3
    • 84941163141 scopus 로고    scopus 로고
    • Preventing timing leaks through transactional branching instructions
    • G. Barthe, T. Rezk, and M. Warnier. Preventing Timing Leaks Through Transactional Branching Instructions. In Proc. QAPL '05.
    • Proc. QAPL '05
    • Barthe, G.1    Rezk, T.2    Warnier, M.3
  • 5
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative Information Flow, Relations and Polymorphic Types. J. Log. Comput., 18(2):181-199, 2005.
    • (2005) J. Log. Comput. , vol.18 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 7
    • 0033725594 scopus 로고    scopus 로고
    • Information flow analysis in a discrete-time process algebra
    • R. Focardi, R. Gorrieri, and F. Martinelli. Information Flow Analysis in a Discrete-Time Process Algebra. In Proc. CSFW '00, pages 170-184.
    • Proc. CSFW '00 , pp. 170-184
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 8
    • 24644477761 scopus 로고    scopus 로고
    • Bridging language-based and process calculi security
    • LNCS 3829
    • \8. R. Focardi, S. Rossi, and A. Sabelfeld. Bridging Language-Based and Process Calculi Security, In Proc. FoSSaCS '05, LNCS 3829, pages 299-315.
    • Proc. FoSSaCS '05 , pp. 299-315
    • Focardi, R.1    Rossi, S.2    Sabelfeld, A.3
  • 9
    • 2442507870 scopus 로고    scopus 로고
    • Abstract non-interference: Parameterizing non-interference by abstract interpretation
    • R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing non-interference by abstract interpretation. In Proc. POPL'04, pages 186-197.
    • Proc. POPL'04 , pp. 186-197
    • Giacobazzi, R.1    Mastroeni, I.2
  • 10
    • 33745473816 scopus 로고    scopus 로고
    • Timed abstract non-interference
    • LNCS 3829
    • R. Giacobazzi and I. Mastroeni. Timed Abstract Non-interference. In Proc. FORMATS'05, LNCS 3829, pages 289-303.
    • Proc. FORMATS'05 , pp. 289-303
    • Giacobazzi, R.1    Mastroeni, I.2
  • 11
    • 0025432462 scopus 로고
    • CCS expressions, finite state processes, and three problems of equivalence
    • P. Kanellakis and S. Smolka. CCS Expressions, Finite State Processes, and Three Problems of Equivalence. Information and Computation, 86:43-68, 1990.
    • (1990) Information and Computation , vol.86 , pp. 43-68
    • Kanellakis, P.1    Smolka, S.2
  • 12
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • LNCS 1109
    • P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proc. CRYPTO '96, LNCS 1109, pages 104-113.
    • Proc. CRYPTO '96 , pp. 104-113
    • Kocher, P.C.1
  • 13
    • 33750239565 scopus 로고    scopus 로고
    • Timing-sensitive information flow analysis for synchronous systems
    • ETH Zürich
    • B. Köpf and D. Basin, Timing-Sensitive Information Flow Analysis for Synchronous Systems. Technical Report 526, ETH Zürich, 2006.
    • (2006) Technical Report , vol.526
    • Köpf, B.1    Basin, D.2
  • 14
    • 33745678531 scopus 로고    scopus 로고
    • Eliminating implicit information leaks by transformational typing and unification
    • LNCS 3866
    • B. Köpf and H. Mantel. Eliminating implicit information leaks by transformational typing and unification. In In Proc. FAST'05, LNCS 3866, pages 42-62, 2006.
    • (2006) Proc. FAST'05 , pp. 42-62
    • Köpf, B.1    Mantel, H.2
  • 15
    • 84948775168 scopus 로고    scopus 로고
    • Quantifying information flow
    • G. Lowe. Quantifying Information Flow. In Proc. CSFW '02, pages 18-31.
    • Proc. CSFW '02 , pp. 18-31
    • Lowe, G.1
  • 16
    • 0028058408 scopus 로고    scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • J. D. McLean. A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions. In Proc. IEEE Symp. on Security and Privacy '94, pages 79-93.
    • Proc. IEEE Symp. on Security and Privacy '94 , pp. 79-93
    • McLean, J.D.1
  • 18
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of AES
    • LNCS 3860
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: the Case of AES. In Proc. CT-RSA '06, LNCS 3860, pages 1-20.
    • Proc. CT-RSA '06 , pp. 1-20
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 19
    • 0023566630 scopus 로고
    • Three partition refinement algorithms
    • R. Paige and R. E. Tarjan. Three Partition Refinement Algorithms. SIAM J. Comput., 6(16):973-989, 1987.
    • (1987) SIAM J. Comput. , vol.6 , Issue.16 , pp. 973-989
    • Paige, R.1    Tarjan, R.E.2
  • 20
    • 0013225410 scopus 로고    scopus 로고
    • A review of worst-case execution-time analysis
    • P. Puschner and A. Burns. A Review of Worst-Case Execution-Time Analysis. Real-Time Systems, 18(2/3): 115-128, 2000.
    • (2000) Real-time Systems , vol.18 , Issue.2-3 , pp. 115-128
    • Puschner, P.1    Burns, A.2
  • 22
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proc. CSFW '00, pages 200-215.
    • Proc. CSFW '00 , pp. 200-215
    • Sabelfeld, A.1    Sands, D.2
  • 23
    • 0035276729 scopus 로고    scopus 로고
    • A PER model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands. A PER Model of Secure Information Flow in Sequential Programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 24
    • 0345382713 scopus 로고    scopus 로고
    • Domain-specific codesign for embedded security
    • P. Schaumont and I. Verbauwhede. Domain-Specific Codesign for Embedded Security. IEEE Computer, 36(4):68-74, 2003.
    • (2003) IEEE Computer , vol.36 , Issue.4 , pp. 68-74
    • Schaumont, P.1    Verbauwhede, I.2
  • 26
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • G. Smith and D. Volpano. Secure Information Flow in a Multi-Threaded Imperative Language. In Proc. POPL '98, pages 355-364.
    • Proc. POPL '98 , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 27
    • 84941152431 scopus 로고    scopus 로고
    • Analyzing for absence of timing leaks in VHDL
    • to appear
    • T. Tolstrup and F. Nielson. Analyzing for Absence of Timing Leaks in VHDL. In Proc. WITS '06 (to appear).
    • Proc. WITS '06
    • Tolstrup, T.1    Nielson, F.2
  • 29
    • 0030673701 scopus 로고    scopus 로고
    • Eliminating covert flows with minimum typings
    • D. Volpano and G. Smith. Eliminating Covert Flows with Minimum Typings. In Proc. CSFW '97, pages 156-168.
    • Proc. CSFW '97 , pp. 156-168
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.