메뉴 건너뛰기




Volumn 50, Issue 1, 2018, Pages

A survey of timing channels and countermeasures

Author keywords

Covert timing channel communication; Network flow watermarking; Timing channel; Timing channel applications; Timing channel countermeasures; Timing side channel

Indexed keywords

CODES (SYMBOLS); COMPUTATION THEORY; TIMING CIRCUITS;

EID: 85017127711     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/3023872     Document Type: Review
Times cited : (68)

References (185)
  • 2
    • 78049348331 scopus 로고    scopus 로고
    • New results on instruction cache attacks
    • Stefan Mangard and Franois-Xavier Standaert (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • O. Aciiçmez, B. Brumley, and P. Grabher. 2010. New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems (CHES'10), Stefan Mangard and Franois-Xavier Standaert (Eds.). Lecture Notes in Computer Science, Vol. 6225. Springer, Berlin, 110-124.
    • (2010) Cryptographic Hardware and Embedded Systems (CHES'10) , vol.6225 , pp. 110-124
    • Aciiçmez, O.1    Brumley, B.2    Grabher, P.3
  • 3
    • 84944627047 scopus 로고    scopus 로고
    • Predicting secret keys via branch prediction
    • Masayuki Abe (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • O. Aciiçmez, Ç. K. Koç, and J. Seifert. 2006. Predicting secret keys via branch prediction. In Topics in Cryptology (CT-RSA'07), Masayuki Abe (Ed.). Lecture Notes in Computer Science, Vol. 4377. Springer, Berlin, 225-242.
    • (2006) Topics in Cryptology (CT-RSA'07) , vol.4377 , pp. 225-242
    • Aciiçmez, O.1    Koç, Ç.K.2    Seifert, J.3
  • 6
    • 85022027006 scopus 로고    scopus 로고
    • Cache based remote timing attack on the AES
    • Masayuki Abe (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • O. Aciiçmez, W. Schindler, and Ç. K. Koç. 2007. Cache based remote timing attack on the AES. In Topics in Cryptology (CT-RSA'07), Masayuki Abe (Ed.). Lecture Notes in Computer Science, Vol. 4377. Springer, Berlin, 271-286.
    • (2007) Topics in Cryptology (CT-RSA'07) , vol.4377 , pp. 271-286
    • Aciiçmez, O.1    Schindler, W.2    Koç, Ç.K.3
  • 9
    • 84884855912 scopus 로고    scopus 로고
    • Attacking AES using bernsteins attack on modern processors
    • Amr Youssef, Abderrahmane Nitaj, and AboulElla Hassanien (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • H. Aly and M. ElGayyar. 2013. Attacking AES using bernsteins attack on modern processors. In Progress in Cryptology (AFRICACRYPT'13), Amr Youssef, Abderrahmane Nitaj, and AboulElla Hassanien (Eds.). Lecture Notes in Computer Science, Vol. 7918. Springer, Berlin, 127-139.
    • (2013) Progress in Cryptology (AFRICACRYPT'13) , vol.7918 , pp. 127-139
    • Aly, H.1    ElGayyar, M.2
  • 13
    • 84905712081 scopus 로고    scopus 로고
    • A comparative analysis of detection metrics for covert timing channels
    • 2014
    • R. Archibald and D. Ghosal. 2014. A comparative analysis of detection metrics for covert timing channels. Computers & Security 45 (2014), 284-292.
    • (2014) Computers & Security , vol.45 , pp. 284-292
    • Archibald, R.1    Ghosal, D.2
  • 15
    • 84884485543 scopus 로고    scopus 로고
    • Side-channel attacks on the McEliece and niederreiter public-key cryptosystems
    • 2011
    • R. Avanzi, S. Hoerder, D. Page, and M. Tunstall. 2011. Side-channel attacks on the McEliece and niederreiter public-key cryptosystems. Journal of Cryptographic Engineering 1, 4 (2011), 271-281.
    • (2011) Journal of Cryptographic Engineering , vol.1 , Issue.4 , pp. 271-281
    • Avanzi, R.1    Hoerder, S.2    Page, D.3    Tunstall, M.4
  • 17
    • 0032022695 scopus 로고    scopus 로고
    • The information-theoretic capacity of discrete-time queues
    • March 1998
    • A. S. Bedekar and M. Azizoglu. 1998. The information-theoretic capacity of discrete-time queues. IEEE Transactions on Information Theory, 44, 2 (March 1998), 446-461.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.2 , pp. 446-461
    • Bedekar, A.S.1    Azizoglu, M.2
  • 19
    • 33744529805 scopus 로고    scopus 로고
    • Technical Report. Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago, Chicago, IL 606077045
    • D. J. Bernstein. 2005. Cache-Timing Attacks on AES. Technical Report. Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago, Chicago, IL 606077045.
    • (2005) Cache-Timing Attacks on AES.
    • Bernstein, D.J.1
  • 20
    • 84997080053 scopus 로고    scopus 로고
    • Source authentication techniques for network-on-chip router configuration packets
    • Nov. 2016
    • A. K. Biswas. 2016. Source authentication techniques for network-on-chip router configuration packets. Journal of Emerging Technology in Computing Systems 13, 2, Article 28 (Nov. 2016), 31 pages. DOI:http://dx.doi.org/10.1145/2996194
    • (2016) Journal of Emerging Technology in Computing Systems , vol.13 , Issue.2
    • Biswas, A.K.1
  • 21
    • 35048848490 scopus 로고    scopus 로고
    • Provably secure masking of AES
    • Helena Handschuh and M. Anwar Hasan (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • J. Blomer, J. Guajardo, and V. Krummel. 2005. Provably secure masking of AES. In Selected Areas in Cryptography, Helena Handschuh and M. Anwar Hasan (Eds.). Lecture Notes in Computer Science, Vol. 3357. Springer, Berlin, 69-83.
    • (2005) Selected Areas in Cryptography , vol.3357 , pp. 69-83
    • Blomer, J.1    Guajardo, J.2    Krummel, V.3
  • 22
    • 77952033303 scopus 로고    scopus 로고
    • Differential cache-collision timing attacks on AES with applications to embedded CPUs
    • Josef Pieprzyk (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • A. Bogdanov, T. Eisenbarth, C. Paar, and M. Wienecke. 2010. Differential cache-collision timing attacks on AES with applications to embedded CPUs. In Topics in Cryptology (CT-RSA'10), Josef Pieprzyk (Ed.). Lecture Notes in Computer Science, Vol. 5985. Springer, Berlin, 235-251.
    • (2010) Topics in Cryptology (CT-RSA'10) , vol.5985 , pp. 235-251
    • Bogdanov, A.1    Eisenbarth, T.2    Paar, C.3    Wienecke, M.4
  • 23
    • 33750814106 scopus 로고    scopus 로고
    • Cache-collision timing attacks against AES
    • Louis Goubin and Mitsuru Matsui (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • J. Bonneau and I. Mironov. 2006. Cache-collision timing attacks against AES. In Cryptographic Hardware and Embedded Systems (CHES'06), Louis Goubin and Mitsuru Matsui (Eds.). Lecture Notes in Computer Science, Vol. 4249. Springer, Berlin, 201-215.
    • (2006) Cryptographic Hardware and Embedded Systems (CHES'06) , vol.4249 , pp. 201-215
    • Bonneau, J.1    Mironov, I.2
  • 24
    • 72449122383 scopus 로고    scopus 로고
    • Cache-timing template attacks
    • Mitsuru Matsui (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • B. Brumley and R. Hakala. 2009. Cache-timing template attacks. In Advances in Cryptology (ASIACRYPT'09), Mitsuru Matsui (Ed.). Lecture Notes in Computer Science, Vol. 5912. Springer, Berlin, 667-684.
    • (2009) Advances in Cryptology (ASIACRYPT'09) , vol.5912 , pp. 667-684
    • Brumley, B.1    Hakala, R.2
  • 25
    • 80052996390 scopus 로고    scopus 로고
    • Remote timing attacks are still practical
    • Vijay Atluri and Claudia Diaz (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • B. Brumley and N. Tuveri. 2011. Remote timing attacks are still practical. In Computer Security (ESORICS'11), Vijay Atluri and Claudia Diaz (Eds.). Lecture Notes in Computer Science, Vol. 6879. Springer, Berlin, 355-371.
    • (2011) Computer Security (ESORICS'11) , vol.6879 , pp. 355-371
    • Brumley, B.1    Tuveri, N.2
  • 27
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • 2005
    • D. Brumley and D. Boneh. 2005. Remote timing attacks are practical. Computer Networks 48, 5 (2005), 701-716.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 28
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • 2004
    • C. Christian. 2004. An information-theoretic model for steganography. Information and Computation 192, 1 (2004), 41-56.
    • (2004) Information and Computation , vol.192 , Issue.1 , pp. 41-56
    • Christian, C.1
  • 31
    • 38049144929 scopus 로고    scopus 로고
    • Steganographic communication in ordered channels
    • Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • R. C. Chakinala, A. Kumarasubramanian, R. Manokaran, G. Noubir, C. P. Rangan, and R. Sundaram. 2007. Steganographic communication in ordered channels. In Information Hiding, Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Lecture Notes in Computer Science, Vol. 4437. Springer, Berlin, 42-57.
    • (2007) Information Hiding , vol.4437 , pp. 42-57
    • Chakinala, R.C.1    Kumarasubramanian, A.2    Manokaran, R.3    Noubir, G.4    Rangan, C.P.5    Sundaram, R.6
  • 33
    • 84868662709 scopus 로고    scopus 로고
    • Improvement of trace-driven i-cache timing attack on the {RSA} algorithm
    • 2013
    • C. Chen, T. Wang, Y. Kou, X. Chen, and X. Li. 2013b. Improvement of trace-driven i-cache timing attack on the {RSA} algorithm. Journal of Systems and Software 86, 1 (2013), 100-107.
    • (2013) Journal of Systems and Software , vol.86 , Issue.1 , pp. 100-107
    • Chen, C.1    Wang, T.2    Kou, Y.3    Chen, X.4    Li, X.5
  • 34
    • 84875455431 scopus 로고    scopus 로고
    • Improving timing attack on RSA-CRT via error detection and correction strategy
    • 2013
    • C. Chen, T. Wang, and J. Tian. 2013a. Improving timing attack on RSA-CRT via error detection and correction strategy. Information Sciences 232 (2013), 464-474.
    • (2013) Information Sciences , vol.232 , pp. 464-474
    • Chen, C.1    Wang, T.2    Tian, J.3
  • 38
    • 84893693485 scopus 로고    scopus 로고
    • Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic
    • 2013
    • W. Cilio, M. Linder, C. Porter, J. Di, D. R. Thompson, and S. C. Smith. 2013. Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic. Microelectronics Journal 44, 3 (2013), 258-269.
    • (2013) Microelectronics Journal , vol.44 , Issue.3 , pp. 258-269
    • Cilio, W.1    Linder, M.2    Porter, C.3    Di, J.4    Thompson, D.R.5    Smith, S.C.6
  • 39
    • 51849162372 scopus 로고    scopus 로고
    • Practical codes for queueing channels: An algebraic, state-space, message-passing approach
    • T. P. Coleman and N. Kiyavash. 2008a. Practical codes for queueing channels: An algebraic, state-space, message-passing approach. In IEEE Information Theory Workshop, 2008 (ITW'08). 318-322.
    • (2008) IEEE Information Theory Workshop, 2008 (ITW'08) , pp. 318-322
    • Coleman, T.P.1    Kiyavash, N.2
  • 42
    • 0003969633 scopus 로고
    • Department of Defense Standard. Technical Report 1985
    • Department of Defense Standard. 1985. Trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD (1985).
    • (1985) Trusted Computer System Evaluation Criteria
  • 43
    • 84954462346 scopus 로고    scopus 로고
    • A practical implementation of the timing attack
    • Jean-Jacques Quisquater and Bruce Schneier (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • J. Dhem, F. Koeune, P. Leroux, P. Mestre, J. Quisquater, and J. Willems. 2000. A practical implementation of the timing attack. In Smart Card Research and Applications, Jean-Jacques Quisquater and Bruce Schneier (Eds.). Lecture Notes in Computer Science, Vol. 1820. Springer, Berlin, 167-182.
    • (2000) Smart Card Research and Applications , vol.1820 , pp. 167-182
    • Dhem, J.1    Koeune, F.2    Leroux, P.3    Mestre, P.4    Quisquater, J.5    Willems, J.6
  • 48
    • 70349686635 scopus 로고    scopus 로고
    • Building covert channels over the packet reordering phenomenon
    • A. El-Atawy and E. Al-Shaer. 2009. Building covert channels over the packet reordering phenomenon. In IEEE INFOCOM 2009. 2186-2194.
    • (2009) IEEE INFOCOM 2009 , pp. 2186-2194
    • El-Atawy, A.1    Al-Shaer, E.2
  • 51
    • 79960973241 scopus 로고    scopus 로고
    • Petrel: Power and timing attack resistant elliptic curve scalar multiplier based on programmable GF(p) arithmetic unit
    • Aug. 2011
    • S. Ghosh, D. Mukhopadhyay, and D. Roychowdhury. 2011. Petrel: Power and timing attack resistant elliptic curve scalar multiplier based on programmable GF(p) arithmetic unit. IEEE Transactions on Circuits and Systems I: Regular Papers, 58, 8 (Aug. 2011), 1798-1812.
    • (2011) IEEE Transactions on Circuits and Systems I: Regular Papers , vol.58 , Issue.8 , pp. 1798-1812
    • Ghosh, S.1    Mukhopadhyay, D.2    Roychowdhury, D.3
  • 52
    • 84901018745 scopus 로고    scopus 로고
    • BLAKE-512-based 128-bit CCA2 secure timing attack resistant McEliece cryptoprocessor
    • May 2014
    • S. Ghosh and I. Verbauwhede. 2014. BLAKE-512-based 128-bit CCA2 secure timing attack resistant McEliece cryptoprocessor. IEEE Transactions on Computers, 63, 5 (May 2014), 1124-1133.
    • (2014) IEEE Transactions on Computers , vol.63 , Issue.5 , pp. 1124-1133
    • Ghosh, S.1    Verbauwhede, I.2
  • 54
    • 80052899318 scopus 로고    scopus 로고
    • An entropy-based approach to detecting covert timing channels
    • Nov.-Dec. 2011
    • S. Gianvecchio and H. Wang. 2011. An entropy-based approach to detecting covert timing channels. IEEE Transactions on Dependable and Secure Computing, 8, 6 (Nov.-Dec. 2011), 785-797.
    • (2011) IEEE Transactions on Dependable and Secure Computing , vol.8 , Issue.6 , pp. 785-797
    • Gianvecchio, S.1    Wang, H.2
  • 56
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • Sep. 2002
    • J. Giles and B. Hajek. 2002. An information-theoretic and game-theoretic study of timing channels. IEEE Transactions on Information Theory, 48, 9 (Sep. 2002), 2455-2477.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 61
    • 84887035165 scopus 로고    scopus 로고
    • Invisible flow watermarks for channels with dependent substitution, deletion, and bursty insertion errors
    • Nov. 2013
    • X. Gong, M. Rodrigues, and N. Kiyavash. 2013. Invisible flow watermarks for channels with dependent substitution, deletion, and bursty insertion errors. IEEE Transactions on Information Forensics and Security, 8, 11 (Nov. 2013), 1850-1859.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , Issue.11 , pp. 1850-1859
    • Gong, X.1    Rodrigues, M.2    Kiyavash, N.3
  • 62
    • 85015284629 scopus 로고    scopus 로고
    • A side-channel timing attack of the MSP430 BSL
    • T. Goodspeed. 2008. A side-channel timing attack of the MSP430 BSL. In Black Hat USA 2008.
    • (2008) Black Hat USA 2008
    • Goodspeed, T.1
  • 65
    • 64949133467 scopus 로고    scopus 로고
    • Technical Report Revision 3.01. Intel Corporation, Intel Architecture Group, Israel Development Center
    • S. Gueron. 2012. Intel Advanced Encryption Standard (AES) New Instructions Set. Technical Report 323641-001, Revision 3.01. Intel Corporation, Intel Architecture Group, Israel Development Center.
    • (2012) Intel Advanced Encryption Standard (AES) New Instructions Set
    • Gueron, S.1
  • 67
    • 85017093014 scopus 로고    scopus 로고
    • Strength of two data encryption standard implementations under timing attacks
    • Nov. 1999
    • A. Hevia and M. Kiwi. 1999. Strength of two data encryption standard implementations under timing attacks. ACM Transactions on Information and System Security 2, 4 (Nov. 1999), 416-437.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.4 , pp. 416-437
    • Hevia, A.1    Kiwi, M.2
  • 69
    • 80053031972 scopus 로고    scopus 로고
    • CoCo: Coding-based covert timing channels for network flows
    • Toms Filler, Toms Pevn, Scott Craver, and Andrew D. Ker (Eds.), Springer
    • A. Houmansadr and N. Borisov. 2011a. CoCo: Coding-based covert timing channels for network flows. In Information Hiding (Lecture Notes in Computer Science), Toms Filler, Toms Pevn, Scott Craver, and Andrew D. Ker (Eds.), Vol. 6958. Springer, 314-328.
    • (2011) Information Hiding (Lecture Notes in Computer Science) , vol.6958 , pp. 314-328
    • Houmansadr, A.1    Borisov, N.2
  • 72
    • 84872680683 scopus 로고    scopus 로고
    • BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
    • 2013
    • A. Houmansadr and N. Borisov. 2013a. BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. Journal of Systems and Software 86, 3 (2013), 707-715.
    • (2013) Journal of Systems and Software , vol.86 , Issue.3 , pp. 707-715
    • Houmansadr, A.1    Borisov, N.2
  • 73
    • 84884930303 scopus 로고    scopus 로고
    • The need for flow fingerprints to link correlated network flows
    • Emiliano De Cristofaro and Matthew Wright (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • A. Houmansadr and N. Borisov. 2013b. The need for flow fingerprints to link correlated network flows. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Matthew Wright (Eds.). Lecture Notes in Computer Science, Vol. 7981. Springer, Berlin, 205-224.
    • (2013) Privacy Enhancing Technologies , vol.7981 , pp. 205-224
    • Houmansadr, A.1    Borisov, N.2
  • 81
    • 84897017345 scopus 로고    scopus 로고
    • On the necessary conditions for covert channel existence: A state-of-the-art survey
    • 2012
    • J. Jaskolka, R. Khedri, and Q. Zhang. 2012. On the necessary conditions for covert channel existence: A state-of-the-art survey. Procedia Computer Science 10 (2012), 458-465.
    • (2012) Procedia Computer Science , vol.10 , pp. 458-465
    • Jaskolka, J.1    Khedri, R.2    Zhang, Q.3
  • 83
    • 84958769993 scopus 로고    scopus 로고
    • Side channel cryptanalysis of product ciphers
    • Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • J. Kelsey, B. Schneier, D. Wagner, and C. Hall. 1998. Side channel cryptanalysis of product ciphers. In Computer Security (ESORICS'98), Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann (Eds.). Lecture Notes in Computer Science, Vol. 1485. Springer, Berlin, 97-110.
    • (1998) Computer Security (ESORICS'98) , vol.1485 , pp. 97-110
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3    Hall, C.4
  • 85
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • Aug. 1983
    • R. A. Kemmerer. 1983. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Transactions on Computer Systems 1, 3 (Aug. 1983), 256-277.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 91
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Neal Koblitz (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • P. C. Kocher. 1996. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In Advances in Cryptology (CRYPTO'96), Neal Koblitz (Ed.). Lecture Notes in Computer Science, Vol. 1109. Springer, Berlin, 104-113.
    • (1996) Advances in Cryptology (CRYPTO'96) , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 92
    • 24144497857 scopus 로고    scopus 로고
    • Technical Report Universite catholique de Louvain, Departement d Electricite (DICE), Belgium
    • F. Koeune and J. Quisquater. 1999. A Timing Attack Against Rijndael. Technical Report CG-1999/1. Universite catholique de Louvain, Departement d Electricite (DICE), Belgium.
    • (1999) A Timing Attack Against Rijndael
    • Koeune, F.1    Quisquater, J.2
  • 95
    • 43149087564 scopus 로고    scopus 로고
    • A fast and cache-timing resistant implementation of the AES
    • Tal Malkin (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • R. Konighofer. 2008. A fast and cache-timing resistant implementation of the AES. In Topics in Cryptology (CT-RSA'08), Tal Malkin (Ed.). Lecture Notes in Computer Science, Vol. 4964. Springer, Berlin, 187-202.
    • (2008) Topics in Cryptology (CT-RSA'08) , vol.4964 , pp. 187-202
    • Konighofer, R.1
  • 96
    • 84875224405 scopus 로고    scopus 로고
    • Mimic: An active covert channel that evades regularity-based detection
    • 2013
    • K. Kothari and M. Wright. 2013. Mimic: An active covert channel that evades regularity-based detection. Computer Networks 57, 3 (2013), 647-657.
    • (2013) Computer Networks , vol.57 , Issue.3 , pp. 647-657
    • Kothari, K.1    Wright, M.2
  • 97
    • 70350594114 scopus 로고    scopus 로고
    • Faster and timing-attack resistant AES-GCM
    • Christophe Clavier and Kris Gaj (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • E. Ksper and P. Schwabe. 2009. Faster and timing-attack resistant AES-GCM. In Cryptographic Hardware and Embedded Systems (CHES'09), Christophe Clavier and Kris Gaj (Eds.). Lecture Notes in Computer Science, Vol. 5747. Springer, Berlin, 1-17.
    • (2009) Cryptographic Hardware and Embedded Systems (CHES'09) , vol.5747 , pp. 1-17
    • Ksper, E.1    Schwabe, P.2
  • 98
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct. 1973
    • B. W. Lampson. 1973. A note on the confinement problem. Communications of the ACM 16, 10 (Oct. 1973), 613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 102
    • 84859617251 scopus 로고    scopus 로고
    • Network covert timing channel with distribution matching
    • 2012
    • G. Liu, J. Zhai, and Y. Dai. 2012. Network covert timing channel with distribution matching. Telecommunication Systems 49, 2 (2012), 199-205.
    • (2012) Telecommunication Systems , vol.49 , Issue.2 , pp. 199-205
    • Liu, G.1    Zhai, J.2    Dai, Y.3
  • 105
    • 78549231319 scopus 로고    scopus 로고
    • Robust and undetectable steganographic timing channels for i.i.d. traffic
    • Rainer Bhme, Philip W. L. Fong, and Reihaneh Safavi-Naini (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • Y. Liu, D. Ghosal, F. Armknecht, A. R. Sadeghi, S. Schulz, and S. Katzenbeisser. 2010. Robust and undetectable steganographic timing channels for i.i.d. traffic. In Information Hiding, Rainer Bhme, Philip W. L. Fong, and Reihaneh Safavi-Naini (Eds.). Lecture Notes in Computer Science, Vol. 6387. Springer, Berlin, 193-207.
    • (2010) Information Hiding , vol.6387 , pp. 193-207
    • Liu, Y.1    Ghosal, D.2    Armknecht, F.3    Sadeghi, A.R.4    Schulz, S.5    Katzenbeisser, S.6
  • 106
    • 82155195910 scopus 로고    scopus 로고
    • An interval centroid based spread spectrum watermarking scheme for multi-flow traceback
    • 2012
    • J. Luo, X. Wang, and M. Yang. 2012b. An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. Journal of Network and Computer Applications 35, 1 (2012), 60-71.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.1 , pp. 60-71
    • Luo, J.1    Wang, X.2    Yang, M.3
  • 107
    • 38049094594 scopus 로고    scopus 로고
    • Cloak: A ten-fold way for reliable covert communications
    • Joachim Biskup and Javier Lpez (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • X. Luo, E. W. W. Chan, and R. K. C. Chang. 2007. Cloak: A ten-fold way for reliable covert communications. In Computer Security (ESORICS'07), Joachim Biskup and Javier Lpez (Eds.). Lecture Notes in Computer Science, Vol. 4734. Springer, Berlin, 283-298.
    • (2007) Computer Security (ESORICS'07) , vol.4734 , pp. 283-298
    • Luo, X.1    Chan, E.W.W.2    Chang, R.K.C.3
  • 110
    • 78049368157 scopus 로고    scopus 로고
    • On the secrecy of spread-spectrum flow watermarks
    • Dimitris Gritzalis, Bart Preneel, and Marianthi Theoharidou (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • X. Luo, J. Zhang, R. Perdisci, and W. Lee. 2010. On the secrecy of spread-spectrum flow watermarks. In Computer Security (ESORICS'10), Dimitris Gritzalis, Bart Preneel, and Marianthi Theoharidou (Eds.). Lecture Notes in Computer Science, Vol. 6345. Springer, Berlin, 232-248.
    • (2010) Computer Security (ESORICS'10) , vol.6345 , pp. 232-248
    • Luo, X.1    Zhang, J.2    Perdisci, R.3    Lee, W.4
  • 115
    • 33747336635 scopus 로고
    • The channel capacity of a certain noisy timing channel
    • 1992
    • I. S. Moskowitz and A. R. Miller. 1992. The channel capacity of a certain noisy timing channel. IEEE Transactions on Information Theory 38, 4 (1992), 1339-1344.
    • (1992) IEEE Transactions on Information Theory , vol.38 , Issue.4 , pp. 1339-1344
    • Moskowitz, I.S.1    Miller, A.R.2
  • 116
    • 84855987565 scopus 로고    scopus 로고
    • Feature extraction and classification algorithm for detecting complex covert timing channel
    • 2012
    • S. Mou, Z. Zhao, S. Jiang, Z. Wu, and J. Zhu. 2012. Feature extraction and classification algorithm for detecting complex covert timing channel. Computers and Security 31, 1 (2012), 70-82.
    • (2012) Computers and Security , vol.31 , Issue.1 , pp. 70-82
    • Mou, S.1    Zhao, Z.2    Jiang, S.3    Wu, Z.4    Zhu, J.5
  • 120
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of AES
    • David Pointcheval (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • D. Osvik, A. Shamir, and E. Tromer. 2006. Cache attacks and countermeasures: The case of AES. In Topics in Cryptology (CT-RSA'06), David Pointcheval (Ed.). Lecture Notes in Computer Science, Vol. 3860. Springer, Berlin, 1-20.
    • (2006) Topics in Cryptology (CT-RSA'06) , vol.3860 , pp. 1-20
    • Osvik, D.1    Shamir, A.2    Tromer, E.3
  • 125
    • 84862800623 scopus 로고    scopus 로고
    • Interval-based flow watermarking for tracing interactive traffic
    • 2012
    • Y. J. Pyun, Y. Park, D. S. Reeves, X. Wang, and P. Ning. 2012. Interval-based flow watermarking for tracing interactive traffic. Computer Networks 56, 5 (2012), 1646-1665.
    • (2012) Computer Networks , vol.56 , Issue.5 , pp. 1646-1665
    • Pyun, Y.J.1    Park, Y.2    Reeves, D.S.3    Wang, X.4    Ning, P.5
  • 129
    • 84865596182 scopus 로고    scopus 로고
    • The silence of the LANs: Efficient leakage resilience for IPsec VPNs
    • Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • A. R. Sadeghi, S. Schulz, and V. Varadharajan. 2012. The silence of the LANs: Efficient leakage resilience for IPsec VPNs. In Computer Security (ESORICS'12), Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.). Lecture Notes in Computer Science, Vol. 7459. Springer, Berlin, 253-270.
    • (2012) Computer Security (ESORICS'12) , vol.7459 , pp. 253-270
    • Sadeghi, A.R.1    Schulz, S.2    Varadharajan, V.3
  • 131
    • 85099426899 scopus 로고    scopus 로고
    • A timing attack against RSA with the chinese remainder theorem
    • ÇetinK Koç and Christof Paar (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • W. Schindler. 2000. A timing attack against RSA with the chinese remainder theorem. In Cryptographic Hardware and Embedded Systems (CHES'00), ÇetinK Koç and Christof Paar (Eds.). Lecture Notes in Computer Science, Vol. 1965. Springer, Berlin, 109-124.
    • (2000) Cryptographic Hardware and Embedded Systems (CHES'00) , vol.1965 , pp. 109-124
    • Schindler, W.1
  • 132
    • 84958960266 scopus 로고    scopus 로고
    • A combined timing and power attack
    • David Naccache and Pascal Paillier (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • W. Schindler. 2002. A combined timing and power attack. In Public Key Cryptography, David Naccache and Pascal Paillier (Eds.). Lecture Notes in Computer Science, Vol. 2274. Springer, Berlin, 263-279.
    • (2002) Public Key Cryptography , vol.2274 , pp. 263-279
    • Schindler, W.1
  • 136
    • 77954596095 scopus 로고    scopus 로고
    • A timing attack against patterson algorithm in the McEliece PKC
    • Donghoon Lee and Seokhie Hong (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • A. Shoufan, F. Strenzke, H. G. Molter, and M. Stottinger. 2010. A timing attack against patterson algorithm in the McEliece PKC. In Information, Security and Cryptology (ICISC'09), Donghoon Lee and Seokhie Hong (Eds.). Lecture Notes in Computer Science, Vol. 5984. Springer, Berlin, 161-175.
    • (2010) Information, Security and Cryptology (ICISC'09) , vol.5984 , pp. 161-175
    • Shoufan, A.1    Strenzke, F.2    Molter, H.G.3    Stottinger, M.4
  • 138
    • 84904082242 scopus 로고    scopus 로고
    • An event-based unified system model to characterize and evaluate timing covert channels
    • March 2016
    • P. L. Shrestha, M. Hempel, H. Sharif, and H. H. Chen. 2016. An event-based unified system model to characterize and evaluate timing covert channels. IEEE Systems Journal 10, 1 (March 2016), 271-280.
    • (2016) IEEE Systems Journal , vol.10 , Issue.1 , pp. 271-280
    • Shrestha, P.L.1    Hempel, M.2    Sharif, H.3    Chen, H.H.4
  • 139
    • 0001217738 scopus 로고
    • The prisoners problem and the subliminal channel
    • David Chaum (Ed.). Springer US
    • G. J. Simmons. 1984. The prisoners problem and the subliminal channel. In Advances in Cryptology, David Chaum (Ed.). Springer US, 51-67.
    • (1984) Advances in Cryptology , pp. 51-67
    • Simmons, G.J.1
  • 141
    • 50049089585 scopus 로고    scopus 로고
    • Detecting IP covert timing channels by correlating packet timing with memory content
    • IEEE
    • R. M. Stillman. 2008. Detecting IP covert timing channels by correlating packet timing with memory content. In IEEE Southeastcon, 2008.IEEE. 204-209.
    • (2008) IEEE Southeastcon, 2008 , pp. 204-209
    • Stillman, R.M.1
  • 142
    • 77954406052 scopus 로고    scopus 로고
    • A timing attack against the secret permutation in the McEliece PKC
    • Nicolas Sendrier (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • F. Strenzke. 2010. A timing attack against the secret permutation in the McEliece PKC. In Post-Quantum Cryptography, Nicolas Sendrier (Ed.). Lecture Notes in Computer Science, Vol. 6061. Springer, Berlin, 95-107.
    • (2010) Post-Quantum Cryptography , vol.6061 , pp. 95-107
    • Strenzke, F.1
  • 143
    • 56749169082 scopus 로고    scopus 로고
    • Side channels in the McEliece PKC
    • Johannes Buchmann and Jintai Ding (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • F. Strenzke, E. Tews, H. G. Molter, R. Overbeck, and A. Shoufan. 2008. Side channels in the McEliece PKC. In Post-Quantum Cryptography, Johannes Buchmann and Jintai Ding (Eds.). Lecture Notes in Computer Science, Vol. 5299. Springer, Berlin, 216-229.
    • (2008) Post-Quantum Cryptography , vol.5299 , pp. 216-229
    • Strenzke, F.1    Tews, E.2    Molter, H.G.3    Overbeck, R.4    Shoufan, A.5
  • 146
    • 0033889530 scopus 로고    scopus 로고
    • Sequential decoding for the exponential server timing channel
    • Mar 2000
    • R. Sundaresan and S. Verdu. 2000b. Sequential decoding for the exponential server timing channel. IEEE Transactions on Information Theory, 46, 2 (Mar 2000), 705-709.
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 705-709
    • Sundaresan, R.1    Verdu, S.2
  • 147
    • 33745130693 scopus 로고    scopus 로고
    • Capacity of queues via point-process channels
    • June 2006
    • R. Sundaresan and S. Verdu. 2006. Capacity of queues via point-process channels. IEEE Transactions on Information Theory, 52, 6 (June 2006), 2697-2709.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2697-2709
    • Sundaresan, R.1    Verdu, S.2
  • 152
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on AES, and countermeasures
    • Jan. 2010
    • E. Tromer, D. A. Osvik, and A. Shamir. 2010. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology 23, 2 (Jan. 2010), 37-71.
    • (2010) Journal of Cryptology , vol.23 , Issue.2 , pp. 37-71
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 153
    • 13444280356 scopus 로고    scopus 로고
    • Zero-rate reliability of the exponential-server timing channel
    • Feb. 2005
    • A. B. Wagner and V. Anantharam. 2005. Zero-rate reliability of the exponential-server timing channel. IEEE Transactions on Information Theory, 51, 2 (Feb. 2005), 447-465.
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.2 , pp. 447-465
    • Wagner, A.B.1    Anantharam, V.2
  • 154
    • 79953787214 scopus 로고    scopus 로고
    • Liquid: A detection-resistant covert timing channel based on IPD shaping
    • 2011
    • R. J. Walls, K. Kothari, and M. Wright. 2011. Liquid: A detection-resistant covert timing channel based on IPD shaping. Computer Networks 55, 6 (2011), 1217-1228.
    • (2011) Computer Networks , vol.55 , Issue.6 , pp. 1217-1228
    • Walls, R.J.1    Kothari, K.2    Wright, M.3
  • 155
    • 84937560280 scopus 로고    scopus 로고
    • Distinguishing exponent digits by observing modular subtractions
    • David Naccache (Ed.). Lecture Notes in Computer Science, Springer, Berlin
    • C. D. Walter and S. Thompson. 2001. Distinguishing exponent digits by observing modular subtractions. In Topics in Cryptology (CT-RSA'01), David Naccache (Ed.). Lecture Notes in Computer Science, Vol. 2020. Springer, Berlin, 192-207.
    • (2001) Topics in Cryptology (CT-RSA'01) , vol.2020 , pp. 192-207
    • Walter, C.D.1    Thompson, S.2
  • 162
    • 79952936543 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by flow watermarking
    • May 2011
    • X. Wang and D. S. Reeves. 2011. Robust correlation of encrypted attack traffic through stepping stones by flow watermarking. IEEE Transactions on Dependable and Secure Computing, 8, 3 (May 2011), 434-449.
    • (2011) IEEE Transactions on Dependable and Secure Computing , vol.8 , Issue.3 , pp. 434-449
    • Wang, X.1    Reeves, D.S.2
  • 163
    • 84887996583 scopus 로고    scopus 로고
    • A novel sequential watermark detection model for efficient traceback of secret network attack flows
    • 2013
    • X. Wang, M. Yang, and J. Luo. 2013. A novel sequential watermark detection model for efficient traceback of secret network attack flows. Journal of Network and Computer Applications 36, 6 (2013), 1660-1670.
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.6 , pp. 1660-1670
    • Wang, X.1    Yang, M.2    Luo, J.3
  • 166
    • 45249103920 scopus 로고    scopus 로고
    • Perfectly secure steganography: Capacity, error exponents, and code constructions
    • June 2008
    • Y. Wang and P. Moulin. 2008. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, 54, 6 (June 2008), 2706-2722.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2706-2722
    • Wang, Y.1    Moulin, P.2
  • 173
    • 82755194868 scopus 로고    scopus 로고
    • Improving performance of network covert timing channel through Huffman coding
    • 2012
    • J. Wu, Y. Wang, L. Ding, and X. Liao. 2012. Improving performance of network covert timing channel through Huffman coding. Mathematical and Computer Modelling 55, 1-2 (2012), 69-79.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 69-79
    • Wu, J.1    Wang, Y.2    Ding, L.3    Liao, X.4
  • 175
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • Nov. 2009
    • L. Yao, X. Zi, L. Pan, and J. Li. 2009. A study of on/off timing channel based on packet delay distribution. Computers & Security 28, 8 (Nov. 2009), 785-794. http://dx.doi.org/10.1016/j.cose.2009.05.006.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3    Li, J.4
  • 178
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • 2007
    • S. Zander, G. Armitage, and P. Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007), 44-57.
    • (2007) IEEE Communications Surveys & Tutorials , vol.9 , Issue.3 , pp. 44-57
    • Zander, S.1    Armitage, G.2    Branch, P.3
  • 179
    • 79956019344 scopus 로고    scopus 로고
    • Stealthier inter-packet timing covert channels
    • Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont, and Caterina Scoglio (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • S. Zander, G. Armitage, and P. Branch. 2011. Stealthier inter-packet timing covert channels. In NETWORKING 2011, Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont, and Caterina Scoglio (Eds.). Lecture Notes in Computer Science, Vol. 6640. Springer, Berlin, 458-470.
    • (2011) NETWORKING 2011 , vol.6640 , pp. 458-470
    • Zander, S.1    Armitage, G.2    Branch, P.3
  • 184
    • 79960353815 scopus 로고    scopus 로고
    • Evaluating the transmission rate of covert timing channels in a network
    • 2011
    • X. Zi, L. Yao, X. Jiang, L. Pan, and J. Li. 2011. Evaluating the transmission rate of covert timing channels in a network. Computer Networks 55, 12 (2011), 2760-2771.
    • (2011) Computer Networks , vol.55 , Issue.12 , pp. 2760-2771
    • Zi, X.1    Yao, L.2    Jiang, X.3    Pan, L.4    Li, J.5
  • 185
    • 77955419362 scopus 로고    scopus 로고
    • Implementing a passive network covert timing channel
    • 2010
    • X. Zi, L. Yao, L. Pan, and J. Li. 2010. Implementing a passive network covert timing channel. Computers and Security 29, 6 (2010), 686-696.
    • (2010) Computers and Security , vol.29 , Issue.6 , pp. 686-696
    • Zi, X.1    Yao, L.2    Pan, L.3    Li, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.