Abstract. Information flow control allows untrusted code to access sensitive and trustworthy information without leaking this information. However, the presence of covert channels subverts this security mechanism, allowing processes to com-municate information in violation of IFC policies. In this paper, we show that concurrent deterministic IFC systems that use time-based scheduling are vulner-able to a cache-based internal timing channel. We demonstrate this vulnerability with a concrete attack on Hails, one particular IFC web framework. To eliminate this internal timing channel, we implement instruction-based scheduling, a new kind of scheduler that is indifferent to timing perturbations from underlying hard-ware components, such as the ...
Information-flow control (IFC) enforcing languages can provide high assurance that software does no...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementati...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
Information flow control allows untrusted code to access sensitive andtrustworthy information without...
Abstract. Information-flow control (IFC) is a security mechanism conceived to allow untrusted code t...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
Information-flow control (IFC) allows untrusted code to manipulate sensitive data while preserving c...
Abstract. Information-flow control (IFC) is a security mechanism con-ceived to allow untrusted code ...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
Abstract—Timing Attacks are a type of side channel attacks. In timing attacks, leaking cache timing ...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
Covert- and side-channel attacks, typically enabled by the usage of shared resources, pose a serious...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
When software is designed, even with security in mind, assumptions are made about the details of har...
Information-flow control (IFC) enforcing languages can provide high assurance that software does no...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementati...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
Information flow control allows untrusted code to access sensitive andtrustworthy information without...
Abstract. Information-flow control (IFC) is a security mechanism conceived to allow untrusted code t...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
Information-flow control (IFC) allows untrusted code to manipulate sensitive data while preserving c...
Abstract. Information-flow control (IFC) is a security mechanism con-ceived to allow untrusted code ...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
Abstract—Timing Attacks are a type of side channel attacks. In timing attacks, leaking cache timing ...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
Covert- and side-channel attacks, typically enabled by the usage of shared resources, pose a serious...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
When software is designed, even with security in mind, assumptions are made about the details of har...
Information-flow control (IFC) enforcing languages can provide high assurance that software does no...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementati...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...