-
1
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
B. W. Lampson, "A note on the confinement problem," Comm. of the ACM, vol. 16, no. 10, pp. 613-615, Oct. 1973.
-
(1973)
Comm. of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
2
-
-
0001297528
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Aug.
-
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Advances in Cryptology - CRYPTO'96, Aug. 1996.
-
(1996)
Advances in Cryptology - CRYPTO'96
-
-
Kocher, P.1
-
3
-
-
18844454571
-
Remote timing attacks are practical
-
Jan.
-
D. Brumley and D. Boneh, "Remote timing attacks are practical," Computer Networks, Jan. 2005.
-
(2005)
Computer Networks
-
-
Brumley, D.1
Boneh, D.2
-
4
-
-
67650815913
-
Cache attacks and countermeasures: The case of AES
-
Jan. [Online]
-
D. Osvik, A. Shamir, and E. Tromer, "Cache attacks and countermeasures: the case of AES," Topics in Cryptology-CT-RSA 2006, Jan. 2006. [Online]. Available: http://www.springerlink.com/index/F52X1H55G1632L17. pdf
-
(2006)
Topics in Cryptology-CT-RSA 2006
-
-
Osvik, D.1
Shamir, A.2
Tromer, E.3
-
8
-
-
78549269294
-
Hide and seek in time - Robust covert timing channels
-
Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, and S. Schulz, "Hide and seek in time - robust covert timing channels," in ESORICS, 2009.
-
(2009)
ESORICS
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
Sadeghi, A.4
Schulz, S.5
-
9
-
-
0016978244
-
Basic limits on protocol information in data communication networks
-
Jul.
-
R. G. Gallagher, "Basic limits on protocol information in data communication networks," IEEE Transactions on Information Theory, vol. 22, no. 4, Jul. 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.4
-
-
Gallagher, R.G.1
-
10
-
-
53349127055
-
Limitations of end-to-end encryption in secure computer networks
-
M. Padlipsky, D. Snow, and P. Karger, "Limitations of end-to-end encryption in secure computer networks," Mitre Corp., Tech. Rep. ESD TR-78-158, 1978.
-
(1978)
Mitre Corp., Tech. Rep. ESD TR-78-158
-
-
Padlipsky, M.1
Snow, D.2
Karger, P.3
-
12
-
-
70350561721
-
A provably secure and efficient countermeasure against timing attacks
-
Jul.
-
B. Köpf and M. Dürmuth, "A provably secure and efficient countermeasure against timing attacks," in 2009 IEEE Computer Security Foundations, Jul. 2009.
-
(2009)
2009 IEEE Computer Security Foundations
-
-
Köpf, B.1
Dürmuth, M.2
-
13
-
-
77957606219
-
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
-
Jul.
-
B. Köpf and G. Smith, "Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks," in 2010 IEEE Computer Security Foundations, Jul. 2010.
-
(2010)
2010 IEEE Computer Security Foundations
-
-
Köpf, B.1
Smith, G.2
-
14
-
-
78650017523
-
Predictive black-box mitigation of timing channels
-
A. Askarov, D. Zhang, and A. C. Myers, "Predictive black-box mitigation of timing channels," in ACM Conf. on Computer and Communications Security (CCS), 2010, pp. 297-307.
-
(2010)
ACM Conf. on Computer and Communications Security (CCS)
, pp. 297-307
-
-
Askarov, A.1
Zhang, D.2
Myers, A.C.3
-
15
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
IEEE Computer Society Press, Jul.
-
A. Sabelfeld and D. Sands, "Probabilistic noninterference for multi-threaded programs," in Proc. 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Jul. 2000, pp. 200-214.
-
(2000)
Proc. 13th IEEE Computer Security Foundations Workshop
, pp. 200-214
-
-
Sabelfeld, A.1
Sands, D.2
-
17
-
-
0033702592
-
Transforming out timing leaks
-
Boston, MA, Jan.
-
J. Agat, "Transforming out timing leaks," in Proc. 27th ACM Symp. on Principles of Programming Languages (POPL), Boston, MA, Jan. 2000, pp. 40-53.
-
(2000)
Proc. 27th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 40-53
-
-
Agat, J.1
-
18
-
-
84942242915
-
Observational determinism for concurrent program security
-
Pacific Grove, California, Jun.
-
S. Zdancewic and A. C. Myers, "Observational determinism for concurrent program security," in Proc. 16th IEEE Computer Security Foundations Workshop, Pacific Grove, California, Jun. 2003, pp. 29-43.
-
(2003)
Proc. 16th IEEE Computer Security Foundations Workshop
, pp. 29-43
-
-
Zdancewic, S.1
Myers, A.C.2
-
19
-
-
78049394407
-
Closing internal timing channels by transformation
-
A. Russo, J. Hughes, D. Naumann, and A. Sabelfeld, "Closing internal timing channels by transformation," in Proc. 11th Annual Asian Computing Science Conference (ASIAN), 2006.
-
(2006)
Proc. 11th Annual Asian Computing Science Conference (ASIAN)
-
-
Russo, A.1
Hughes, J.2
Naumann, D.3
Sabelfeld, A.4
-
20
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
DOI 10.1109/TIT.2002.801405, PII 1011092002801405
-
J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels." IEEE Transactions on Information Theory, vol. 48, no. 9, pp. 2455-2477, 2002. (Pubitemid 35032673)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
24
-
-
33747336635
-
The channel capacity of a certain noisy timing channel
-
I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. on Information Theory, vol. 38, no. 4, pp. 1339-1344.
-
IEEE Trans. on Information Theory
, vol.38
, Issue.4
, pp. 1339-1344
-
-
Moskowitz, I.S.1
Miller, A.R.2
-
26
-
-
0027719713
-
A pump for rapid, reliable, secure communication
-
Nov.
-
M. H. Kang and I. S. Moskowitz, "A pump for rapid, reliable, secure communication," in ACM Conf. on Computer and Communications Security (CCS), Nov. 1993, pp. 119-129.
-
(1993)
ACM Conf. on Computer and Communications Security (CCS)
, pp. 119-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
27
-
-
0000446356
-
A network pump
-
M. H. Kang, I. S. Moskowitz, and D. C. Lee, "A network pump," IEEE Transactions on Software Engineering, vol. 22, pp. 329-338, 1996. (Pubitemid 126771674)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 329-338
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
|