Sciweavers

CORR
2008
Springer
85views Education» more  CORR 2008»
14 years 16 days ago
Quantifying Timing Leaks and Cost Optimisation
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
POPL
1998
ACM
14 years 4 months ago
Secure Information Flow in a Multi-Threaded Imperative Language
Previously, we developed a type system to ensure secure information flow in a sequential, imperative programming language [VSI96]. Program variables are classified as either hig...
Geoffrey Smith, Dennis M. Volpano