메뉴 건너뛰기




Volumn , Issue , 2011, Pages 563-574

Predictive mitigation of timing channels in interactive systems

Author keywords

Information flow; Interactive systems; Mitigation; Timing channels

Indexed keywords

INFORMATION FLOWS; INTERACTIVE SYSTEM; MITIGATION; MULTIPLE CLIENTS; OUTPUT EVENTS; PUBLIC INFORMATION; TIMING CHANNELS; WEB APPLICATION;

EID: 80755187785     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046772     Document Type: Conference Paper
Times cited : (92)

References (28)
  • 1
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct.
    • B. W. Lampson, "A note on the confinement problem," Comm. of the ACM, vol. 16, no. 10, pp. 613-615, Oct. 1973.
    • (1973) Comm. of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 2
    • 0001297528 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Aug.
    • P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Advances in Cryptology - CRYPTO'96, Aug. 1996.
    • (1996) Advances in Cryptology - CRYPTO'96
    • Kocher, P.1
  • 3
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • Jan.
    • D. Brumley and D. Boneh, "Remote timing attacks are practical," Computer Networks, Jan. 2005.
    • (2005) Computer Networks
    • Brumley, D.1    Boneh, D.2
  • 4
    • 67650815913 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of AES
    • Jan. [Online]
    • D. Osvik, A. Shamir, and E. Tromer, "Cache attacks and countermeasures: the case of AES," Topics in Cryptology-CT-RSA 2006, Jan. 2006. [Online]. Available: http://www.springerlink.com/index/F52X1H55G1632L17. pdf
    • (2006) Topics in Cryptology-CT-RSA 2006
    • Osvik, D.1    Shamir, A.2    Tromer, E.3
  • 9
    • 0016978244 scopus 로고
    • Basic limits on protocol information in data communication networks
    • Jul.
    • R. G. Gallagher, "Basic limits on protocol information in data communication networks," IEEE Transactions on Information Theory, vol. 22, no. 4, Jul. 1976.
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.4
    • Gallagher, R.G.1
  • 12
    • 70350561721 scopus 로고    scopus 로고
    • A provably secure and efficient countermeasure against timing attacks
    • Jul.
    • B. Köpf and M. Dürmuth, "A provably secure and efficient countermeasure against timing attacks," in 2009 IEEE Computer Security Foundations, Jul. 2009.
    • (2009) 2009 IEEE Computer Security Foundations
    • Köpf, B.1    Dürmuth, M.2
  • 13
    • 77957606219 scopus 로고    scopus 로고
    • Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
    • Jul.
    • B. Köpf and G. Smith, "Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks," in 2010 IEEE Computer Security Foundations, Jul. 2010.
    • (2010) 2010 IEEE Computer Security Foundations
    • Köpf, B.1    Smith, G.2
  • 15
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • IEEE Computer Society Press, Jul.
    • A. Sabelfeld and D. Sands, "Probabilistic noninterference for multi-threaded programs," in Proc. 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Jul. 2000, pp. 200-214.
    • (2000) Proc. 13th IEEE Computer Security Foundations Workshop , pp. 200-214
    • Sabelfeld, A.1    Sands, D.2
  • 18
    • 84942242915 scopus 로고    scopus 로고
    • Observational determinism for concurrent program security
    • Pacific Grove, California, Jun.
    • S. Zdancewic and A. C. Myers, "Observational determinism for concurrent program security," in Proc. 16th IEEE Computer Security Foundations Workshop, Pacific Grove, California, Jun. 2003, pp. 29-43.
    • (2003) Proc. 16th IEEE Computer Security Foundations Workshop , pp. 29-43
    • Zdancewic, S.1    Myers, A.C.2
  • 20
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • DOI 10.1109/TIT.2002.801405, PII 1011092002801405
    • J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels." IEEE Transactions on Information Theory, vol. 48, no. 9, pp. 2455-2477, 2002. (Pubitemid 35032673)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 24
    • 33747336635 scopus 로고    scopus 로고
    • The channel capacity of a certain noisy timing channel
    • I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. on Information Theory, vol. 38, no. 4, pp. 1339-1344.
    • IEEE Trans. on Information Theory , vol.38 , Issue.4 , pp. 1339-1344
    • Moskowitz, I.S.1    Miller, A.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.