메뉴 건너뛰기




Volumn , Issue , 2010, Pages 297-307

Predictive black-box mitigation of timing channels

Author keywords

Information flow; Mitigation; Timing channels

Indexed keywords

AMOUNT OF INFORMATION; BLACK BOXES; GENERAL CLASS; INFORMATION FLOW CONTROL; INFORMATION FLOWS; MITIGATION; OUTPUT EVENTS; TIMING ATTACKS; TIMING CHANNELS;

EID: 78650017523     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866341     Document Type: Conference Paper
Times cited : (131)

References (33)
  • 3
    • 0027941028 scopus 로고
    • Mode security: An infrastructure for covert channel suppression. in
    • May
    • R. Browne. Mode security: An infrastructure for covert channel suppression. In IEEE Symposium on Research in Security and Privacy, pages 39-55, May 1994.
    • (1994) IEEE Symposium on Research in Security and Privacy , pp. 39-55
    • Browne, R.1
  • 4
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • Jan
    • D. Brumley and D. Boneh. Remote timing attacks are practical. Computer Networks, Jan. 2005.
    • (2005) Computer Networks
    • Brumley, D.1    Boneh, D.2
  • 5
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum. Blind signatures for untraceable payments. In CRYPTO, pages 199-203, 1982.
    • (1982) CRYPTO , pp. 199-203
    • Chaum, D.1
  • 8
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • Dec
    • D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10(4), Dec. 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.4
    • Coppersmith, D.1
  • 9
    • 0016978244 scopus 로고
    • Basic limits on protocol information in data communication networks
    • July
    • R. G. Gallagher. Basic limits on protocol information in data communication networks. IEEE Transactions on Information Theory, 22(4), July 1976.
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.4
    • Gallagher, R.G.1
  • 10
    • 77952331178 scopus 로고    scopus 로고
    • Detecting covert timing channels: An entropy-based approach
    • Oct
    • S. Gianvecchio and H. Wang. Detecting covert timing channels: an entropy-based approach. In CCS '07, Oct. 2007.
    • (2007) CCS '07
    • Gianvecchio, S.1    Wang, H.2
  • 11
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • J. Giles and B. Hajek. An information-theoretic and game-theoretic study of timing channels. IEEE Transactions on Information Theory, 48(9):2455-2477, 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 13
    • 0029707442 scopus 로고    scopus 로고
    • Several secure store and forward devices
    • Mar
    • D. M. Goldschlag. Several secure store and forward devices. In CCS '96, pages 129-137, Mar. 1996.
    • (1996) CCS '96 , pp. 129-137
    • Goldschlag, D.M.1
  • 15
    • 0027719713 scopus 로고
    • A pump for rapid, reliable, secure communication
    • Nov
    • M. H. Kang and I. S. Moskowitz. A pump for rapid, reliable, secure communication. In CCS '93, pages 119-129, Nov. 1993.
    • (1993) CCS '93 , pp. 119-129
    • Kang, M.H.1    Moskowitz, I.S.2
  • 17
    • 0001297528 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Aug
    • P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology-CRYPTO'96, Aug. 1996.
    • (1996) Advances in Cryptology-CRYPTO'96
    • Kocher, P.1
  • 18
    • 70350561721 scopus 로고    scopus 로고
    • A provably secure and efficient countermeasure against timing attacks
    • July
    • B. Köpf and M. Dürmuth. A provably secure and efficient countermeasure against timing attacks. In 2009 IEEE Computer Security Foundations, July 2009.
    • (2009) 2009 IEEE Computer Security Foundations
    • Köpf, B.1    Dürmuth, M.2
  • 19
    • 77957606219 scopus 로고    scopus 로고
    • Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
    • July
    • B. Köpf and G. Smith. Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In 2010 IEEE Computer Security Foundations, July 2010.
    • (2010) 2010 IEEE Computer Security Foundations
    • Köpf, B.1    Smith, G.2
  • 20
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct
    • B. W. Lampson. A note on the confinement problem. Comm. of the ACM, 16(10):613-615, Oct. 1973.
    • (1973) Comm. of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 27
    • 53349127055 scopus 로고
    • Limitations of end-to-end encryption in secure computer networks
    • Mitre Corp
    • M. Padlipsky, D. Snow, and P. Karger. Limitations of end-to-end encryption in secure computer networks. Technical Report ESD TR-78-158, Mitre Corp., 1978.
    • (1978) Technical Report ESD TR-78-158
    • Padlipsky, M.1    Snow, D.2    Karger, P.3
  • 33
    • 84942242915 scopus 로고    scopus 로고
    • Observational determinism for concurrent program security
    • Pacific Grove, California, June
    • S. Zdancewic and A. C. Myers. Observational determinism for concurrent program security. In Proc. 16th IEEE Computer Security Foundations Workshop, pages 29-43,Pacific Grove, California, June 2003.
    • (2003) Proc. 16th IEEE Computer Security Foundations Workshop , pp. 29-43
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.