메뉴 건너뛰기




Volumn , Issue , 2011, Pages 413-428

Timing- and termination-sensitive secure information flow: Exploring a new approach

Author keywords

[No Author keywords available]

Indexed keywords

SENSITIVE DATA;

EID: 80051974927     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.19     Document Type: Conference Paper
Times cited : (66)

References (41)
  • 4
    • 33751073715 scopus 로고    scopus 로고
    • A logic for information flow analysis with an application to forward slicing of simple imperative programs
    • DOI 10.1016/j.scico.2006.03.002, PII S0167642306001559
    • T. Amtoft and A. Banerjee. A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Computer Programming (SCP), 64(1):3-28, 2007. (Pubitemid 44765091)
    • (2007) Science of Computer Programming , vol.64 , Issue.1 SPEC. ISS. , pp. 3-28
    • Amtoft, T.1    Banerjee, A.2
  • 8
    • 35348884907 scopus 로고    scopus 로고
    • Exposing private information by timing web applications
    • DOI 10.1145/1242572.1242656, 16th International World Wide Web Conference, WWW2007
    • A. Bortz and D. Boneh. Exposing private information by timing web applications. In International Conference on World Wide Web (WWW), pages 621-628, 2007. (Pubitemid 47582291)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 621-628
    • Bortz, A.1    Boneh, D.2    Nandy, P.3
  • 9
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for concurrent programs
    • Automata, Languages and Programming
    • G. Boudol and I. Castellani. Noninterference for concurrent programs. In International Colloquium on Automata, Languages and Programming (ICALP), pages 382-395, 2001. (Pubitemid 33300815)
    • (2001) Lecture Notes in Computer Science , Issue.2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM (CACM), 19(5):236-243, 1976.
    • (1976) Communications of the ACM (CACM) , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 12
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM (CACM), 20(7):504-513, 1977.
    • (1977) Communications of the ACM (CACM) , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 14
    • 85177641403 scopus 로고    scopus 로고
    • Personal communication, November
    • D. Devriese and F. Piessens. Personal communication, November 2010.
    • (2010)
    • Devriese, D.1    Piessens, F.2
  • 21
    • 28044445125 scopus 로고    scopus 로고
    • Timing aware information flow security for a javaCard-like bytecode
    • DOI 10.1016/j.entcs.2005.02.031, PII S1571066105051492
    • D. Hedin and D. Sands. Timing aware information flow security for a javacard-like bytecode. Electronic Notes in Theoretical Computer Science, 141(1):163-182, 2005. (Pubitemid 41689008)
    • (2005) Electronic Notes in Theoretical Computer Science , vol.141 , Issue.1 SPEC. ISS. , pp. 163-182
    • Hedin, D.1    Sands, D.2
  • 25
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Advances in Cryptology - CRYPTO '96
    • P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In International Cryptology Conference on Advances in Cryptology (CRYPTO), pages 104-113, 1996. (Pubitemid 126106234)
    • (1996) Lecture Ns in Computer Science , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 26
    • 0031543270 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • A. C. Myers and B. Liskov. A decentralized model for information flow control. SIGOPS Operating Systems Review (OSR), 31(5):129-142, October 1997. (Pubitemid 127466034)
    • (1997) Operating Systems Review (ACM) , vol.31 , Issue.5 , pp. 129-142
    • Myers, A.C.1    Liskov, B.2
  • 27
    • 84867997005 scopus 로고    scopus 로고
    • A fast algorithm for the maximum clique problem
    • P. R. J. Östergård. A fast algorithm for the maximum clique problem. Discrete Applied Mathematics, 120(1-3):197-207, 2002.
    • (2002) Discrete Applied Mathematics , vol.120 , Issue.1-3 , pp. 197-207
    • Östergård, P.R.J.1
  • 30
    • 33947645959 scopus 로고    scopus 로고
    • Securing interaction between threads and the scheduler
    • DOI 10.1109/CSFW.2006.29, 1648717, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • A. Russo and A. Sabelfeld. Securing interaction between threads and the scheduler. In IEEE Workshop on Computer Security Foundations, pages 177-189, 2006. (Pubitemid 46499726)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 177-189
    • Russo, A.1    Sabelfeld, A.2
  • 39
    • 80051982001 scopus 로고    scopus 로고
    • Timing attacks on RSA: Revealing your secrets through the fourth dimension
    • May
    • W. H. Wong. Timing attacks on RSA: revealing your secrets through the fourth dimension. Crossroads, 11(3):5, May 2005.
    • (2005) Crossroads , vol.11 , Issue.3 , pp. 5
    • Wong, W.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.