메뉴 건너뛰기




Volumn , Issue , 2007, Pages 31-40

Quantitative analysis of leakage for multi-threaded programs

Author keywords

Information Theory; Multi threaded Languages; Security

Indexed keywords

INFORMATION FLOW; MULTI THREADED PROGRAMS; SINGLE-THREAD LOOPING PROGRAMS;

EID: 36448964849     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1255329.1255335     Document Type: Conference Paper
Times cited : (30)

References (49)
  • 4
    • 36448974611 scopus 로고    scopus 로고
    • Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow analysis of pointer programs
    • TR 2005-1, Kansas State University, July
    • Torben. Amtoft, Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow analysis of pointer programs. Technical Report CIS TR 2005-1, Kansas State University, July 2005.
    • (2005) Technical Report CIS
    • Torben1    Amtoft2
  • 5
    • 33745806932 scopus 로고    scopus 로고
    • Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow in object-oriented programs
    • New York, NY, USA, ACM Press
    • Torben. Amtoft, Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow in object-oriented programs. In Proc. ACM Symp. on Principles of Programming Languages, pages 91-102, New York, NY, USA, 2006. ACM Press.
    • (2006) Proc. ACM Symp. on Principles of Programming Languages , pp. 91-102
    • Torben1    Amtoft2
  • 6
    • 33646826538 scopus 로고    scopus 로고
    • Manual Barbosa and Daniel Page. On the automatic construction of indistinguishable operations
    • Manual Barbosa and Daniel Page. On the automatic construction of indistinguishable operations. In IMA Int. Conf, pages 233-247, 2005.
    • (2005) IMA Int. Conf , pp. 233-247
  • 8
    • 36448994127 scopus 로고    scopus 로고
    • Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
    • Technical Report RS-05-18, BRICS, June, 37 pp
    • Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, and Tomas Toft. Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications. Technical Report RS-05-18, BRICS, June 2005. 37 pp.
    • (2005)
    • Bogetoft, P.1    Damgård, I.2    Jakobsen, T.3    Nielsen, K.4    Pagter, J.5    Toft, T.6
  • 9
    • 84858472511 scopus 로고    scopus 로고
    • Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, and Tomas Toft. A practical implementation of secure auctions based on multiparty integer computation. In Proc. of Financial Cryptography, 4.107 of LNCS. Springer-Verlag, 2006.
    • Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, and Tomas Toft. A practical implementation of secure auctions based on multiparty integer computation. In Proc. of Financial Cryptography, volume 4.107 of LNCS. Springer-Verlag, 2006.
  • 10
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • David Brumley and Dan Boneh. Remote timing attacks are practical. Comput. Networks, 48(5):701-716, 2005.
    • (2005) Comput. Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 11
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. IEEE Symp. on Foundations of Computer Science, pages 136-145, 2001.
    • (2001) Proc. IEEE Symp. on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 12
    • 36448941560 scopus 로고    scopus 로고
    • Quantitative analysis of the leakage of confidential data
    • January
    • David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative analysis of the leakage of confidential data. J. Theoretical Computer Science, 59(3):1-14, January 2004.
    • (2004) J. Theoretical Computer Science , vol.59 , Issue.3 , pp. 1-14
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 13
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • Patrick Cousot and Radhia Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. ACM Symp. on Principles of Programming Languages, pages 238-252, 1977.
    • (1977) Proc. ACM Symp. on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 14
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • Proc. Theory of Cryptography Conference, of, Springer-Verlag, May
    • Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, and Tomas Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Proc. Theory of Cryptography Conference, volume 3876 of LNCS, pages 285-304. Springer-Verlag, May 2006.
    • (2006) LNCS , vol.3876 , pp. 285-304
    • Damgård, I.1    Fitzi, M.2    Kiltz, E.3    Buus Nielsen, J.4    Toft, T.5
  • 15
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy Elizabeth Rob Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Elizabeth, D.1    Denning, R.2
  • 16
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Dorothy Elizabeth Rob Denning and Peter J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, 1977.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Elizabeth, D.1    Denning, R.2    Denning, P.J.3
  • 17
    • 1442286773 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • Pablo Giambiagi and Mads Dam. On the secure implementation of security protocols. Sci. Comput. Program., 50(1-3):73-99, 2004.
    • (2004) Sci. Comput. Program , vol.50 , Issue.1-3 , pp. 73-99
    • Giambiagi, P.1    Dam, M.2
  • 18
    • 0020299523 scopus 로고
    • Security policies and security models
    • IEEE Computer Society Press
    • Joseph A. Goguen and José Meseguer. Security policies and security models. In Proc. IEEE Symp. on Security and Privacy, pages 11-20. IEEE Computer Society Press, 1982.
    • (1982) Proc. IEEE Symp. on Security and Privacy , pp. 11-20
    • Goguen, J.A.1    Meseguer, J.2
  • 19
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with, secrecy and integrity
    • New York, NY, USA, ACM Press
    • Nevin Heintze and Jon G. Riecke. The SLam calculus: programming with, secrecy and integrity. In Proc. ACM Symp. on Principles of Programming Languages, pages 365-377, New York, NY, USA, 1998. ACM Press.
    • (1998) Proc. ACM Symp. on Principles of Programming Languages , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2
  • 20
    • 36448988684 scopus 로고    scopus 로고
    • Thomas Jakobsen and Strange From. Secure multi-party computation on integers. Master's thesis, Department of Computer Science, DAIMI, University of Aarhus, Denmark, July 2005.
    • Thomas Jakobsen and Strange From. Secure multi-party computation on integers. Master's thesis, Department of Computer Science, DAIMI, University of Aarhus, Denmark, July 2005.
  • 21
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of DiffieHellman, RSA, DSS, and other systems
    • Proc. International Ctyptology Conference on Advances in Cryptology, of, London, UK, Springer-Verlag
    • Paul C. Kocher. Timing attacks on implementations of DiffieHellman, RSA, DSS, and other systems. In Proc. International Ctyptology Conference on Advances in Cryptology, volume 1109 of LNCS, pages 104-113, London, UK, 1996. Springer-Verlag.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 24
    • 28144461940 scopus 로고    scopus 로고
    • Downgrading policies and relaxed noninterference
    • New York, NY, USA, ACM Press
    • Peng Li and Steve Zdancewic. Downgrading policies and relaxed noninterference. In Proc. ACM Symp. on Principles of Programming Languages, pages 158-170, New York, NY, USA, 2005. ACM Press.
    • (2005) Proc. ACM Symp. on Principles of Programming Languages , pp. 158-170
    • Li, P.1    Zdancewic, S.2
  • 26
    • 35048815139 scopus 로고    scopus 로고
    • Controlled declassification based on intransitive noninterference
    • Proc. of the ASIAN Symposium on Programming Languages and Systems, of, Taipei, Taiwan, November 4-6, Springer-Verlag
    • Heiko Mantel and David Sands. Controlled declassification based on intransitive noninterference. In Proc. of the ASIAN Symposium on Programming Languages and Systems, volume 3303 of LNCS, pages 129-145, Taipei, Taiwan, November 4-6 2004. Springer-Verlag.
    • (2004) LNCS , vol.3303 , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 27
    • 28144441375 scopus 로고    scopus 로고
    • On declassification and the non-disclosure policy
    • Washington, DC, USA, IEEE Computer Society Press
    • Ana Ameida Matos and Gerard Boudol. On declassification and the non-disclosure policy. In Proc. IEEE Computer Security Foundations Workshop, pages 226-240, Washington, DC, USA, 2005. IEEE Computer Society Press.
    • (2005) Proc. IEEE Computer Security Foundations Workshop , pp. 226-240
    • Ameida Matos, A.1    Boudol, G.2
  • 29
    • 36448945897 scopus 로고    scopus 로고
    • The SMCL Language Specification
    • Technical Report RS-07-9, BRICS, April
    • Janus Dam Nielsen and Michael I. Schwartzbach. The SMCL Language Specification. Technical Report RS-07-9, BRICS, April 2007.
    • (2007)
    • Dam Nielsen, J.1    Schwartzbach, M.I.2
  • 33
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Pmc. of the International Symposium on Software Security, of, Springer-Verlag, October
    • Andrei Sabelfeld and Andrew Myers. A model for delimited information release. In Pmc. of the International Symposium on Software Security, volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.2
  • 34
    • 84957869855 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • Andrei Sabelfeld and David Sands. A per model of secure information flow in sequential programs. In Proc. European Symposium on Programming, pages 40-58, 1999.
    • (1999) Proc. European Symposium on Programming , pp. 40-58
    • Sabelfeld, A.1    Sands, D.2
  • 35
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • Washington, DC, USA, July, IEEE Computer Society Press
    • Andrei Sabelfeld and David Sands. Probabilistic noninterference for multi-threaded programs. In Proc. IEEE Computer Security Foundations Workshop, page 200, Washington, DC, USA, July 2000. IEEE Computer Society Press.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 200
    • Sabelfeld, A.1    Sands, D.2
  • 36
    • 28144453799 scopus 로고    scopus 로고
    • Dimensions and principles of declassification
    • Washington, DC, USA, IEEE Computer Society Press
    • Andrei Sabelfeld and David Sands. Dimensions and principles of declassification. In Proc. IEEE Computer Security Foundations Workshop, pages 255-269, Washington, DC, USA, 2005. IEEE Computer Society Press.
    • (2005) Proc. IEEE Computer Security Foundations Workshop , pp. 255-269
    • Sabelfeld, A.1    Sands, D.2
  • 38
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • New York, NY
    • Geoffrey Smith and Dennis Volpano. Secure information flow in a multi-threaded imperative language. In Proc. ACM Symp. on Principles of Programming Languages, pages 355-364, New York, NY, 1998.
    • (1998) Proc. ACM Symp. on Principles of Programming Languages , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 39
    • 33750087380 scopus 로고    scopus 로고
    • Secure Integer Computation with Applications in Economics
    • July
    • Tomas Toft. Progress report - Secure Integer Computation with Applications in Economics., July 2005.
    • (2005) Progress report
    • Toft, T.1
  • 41
    • 26844470115 scopus 로고    scopus 로고
    • Information Flow Analysis for VHDL
    • Victor E. Malyshkin, editor, Proc. International Conference on Parallel Computing Technologies, of, Springer-Verlag, September
    • Terkel K. Tolstrup, Flemming Nielson, and Hanne Riis Nielson. Information Flow Analysis for VHDL. In Victor E. Malyshkin, editor, Proc. International Conference on Parallel Computing Technologies, volume 3606 of LNCS, pages 79-98. Springer-Verlag, September 2005.
    • (2005) LNCS , vol.3606 , pp. 79-98
    • Tolstrup, T.K.1    Nielson, F.2    Riis Nielson, H.3
  • 42
    • 0001813087 scopus 로고    scopus 로고
    • Domain-specific languages: An annotated bibliography
    • Arie van Deursen, Paul Klint, and Joost Visser. Domain-specific languages: An annotated bibliography. SIGPLAN Notices, 35(6):26-36, 2000.
    • (2000) SIGPLAN Notices , vol.35 , Issue.6 , pp. 26-36
    • Arie van Deursen, P.K.1    Visser, J.2
  • 44
    • 0031633213 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • IEEE Computer Society Press
    • Dennis Volpano and Geoffrey Smith. Probabilistic noninterference in a concurrent language. In Proc. IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 1998.
    • (1998) Proc. IEEE Computer Security Foundations Workshop
    • Volpano, D.1    Smith, G.2
  • 45
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 49
    • 36448997106 scopus 로고    scopus 로고
    • Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning
    • Technical Report 2001-1846, Cornell University
    • Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning. Technical Report 2001-1846, Cornell University, 2001.
    • (2001)
    • Steve1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.