메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1044-1052

Mitigating timing based information leakage in shared schedulers

Author keywords

[No Author keywords available]

Indexed keywords

ESTIMATION ERRORS; EVENT SCHEDULER; FORMAL FRAMEWORK; INFORMATION LEAKAGE; MINIMUM INFORMATION; PERFORMANCE METRICES; PRIVACY AND SECURITY; SCHEDULING POLICIES; SERVICE TIME; SHARED MEMORIES; SHARED RESOURCES; SIDE-CHANNEL; TIMING INFORMATION; TRAFFIC PATTERN; UPPER BOUND; USAGE PATTERNS;

EID: 84861617955     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195460     Document Type: Conference Paper
Times cited : (24)

References (25)
  • 1
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 4
    • 0026156690 scopus 로고
    • Reducing timing channels with fuzzy time
    • IEEE
    • W. M. Hu, "Reducing timing channels with fuzzy time," in IEEE Symposium on Security and Privacy, pp. 8-20, IEEE, 1991.
    • (1991) IEEE Symposium on Security and Privacy , pp. 8-20
    • Hu, W.M.1
  • 8
    • 79959957319 scopus 로고    scopus 로고
    • Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems
    • K. Zhang and X. Wang, "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems," in USENIX Security, 2009.
    • (2009) USENIX Security
    • Zhang, K.1    Wang, X.2
  • 13
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • D. Brumley and D. Boneh, "Remote timing attacks are practical," Computer Networks, vol. 48, no. 5, pp. 701-716, 2005.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 14
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Springer
    • P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Advances in CryptologyCRYPTO96, pp. 104-113, Springer, 1996.
    • (1996) Advances in CryptologyCRYPTO96 , pp. 104-113
    • Kocher, P.1
  • 15
    • 0036715113 scopus 로고    scopus 로고
    • An Information-Theoretic and Game-Theoretic Study of Timing Channels
    • September
    • J. Giles and B. Hajek, "An Information-Theoretic and Game-Theoretic Study of Timing Channels," IEEE Transactions on Information Theory, vol. 48, pp. 2455-2477, September 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 18
    • 33747336635 scopus 로고
    • The channel capacity of a certain noisy timing channel
    • July
    • I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. Inform. Theory, vol. 38, pp. 1339-1344, July 1992.
    • (1992) IEEE Trans. Inform. Theory , vol.38 , pp. 1339-1344
    • Moskowitz, I.S.1    Miller, A.R.2
  • 20
    • 0013244904 scopus 로고
    • The entropy of a point process
    • J. A. McFadden, "The entropy of a point process," SIAM Journal on Applied Mathematics, vol. 13, no. 4, pp. 988-994, 1965.
    • (1965) SIAM Journal on Applied Mathematics , vol.13 , Issue.4 , pp. 988-994
    • McFadden, J.A.1
  • 22
    • 0028273691 scopus 로고
    • Relations between entropy and error probability
    • jan
    • M. Feder and N. Merhav, "Relations between entropy and error probability," Information Theory, IEEE Transactions on, vol. 40, pp. 259-266, jan 1994.
    • (1994) Information Theory, IEEE Transactions on , vol.40 , pp. 259-266
    • Feder, M.1    Merhav, N.2
  • 25
    • 84861594498 scopus 로고    scopus 로고
    • class notes, available online at
    • R. G. Gallager, Poisson Processes, class notes, available online at http: //www.rle.mit.edu/ rgallager/documents/6.262ch2Dec10 000.pdf .
    • Poisson Processes
    • Gallager, R.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.