Sciweavers

JLP
2007

Tempus fugit: How to plug it

14 years 15 days ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks. Key words: Security Analysis, Timing Leaks, Program Transformation, Probabilistic Processes
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,
Added 15 Dec 2010
Updated 15 Dec 2010
Type Journal
Year 2007
Where JLP
Authors Alessandra Di Pierro, Chris Hankin, Igor Siveroni, Herbert Wiklicky
Comments (0)