iv vAbstract Interrupt-related covert channels allow two processes running on a single system to com-municate with each other, circumventing the security mechanisms contained in standard operating systems. These channels belong to the class of timing channels and use the CPU as their shared resource. They transmit information by a sender process executing an op-eration that induces a hardware interrupt, and a receiver process detecting the interrupt. Both ends of the channel thus do not exploit that they share the CPU, but rather that the receiver and sender-initiated interrupts share the CPU. Consequently this channel is in general not prohibited by time-partitioning the CPU among all processes, as the literature about timing channels sugg...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
Multi-process concurrency is effective in improving program efficiency and maximizing CPU utilizatio...
Interrupt-driven communication with hardware devices can be exploited for establishing covert ch...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Abstract We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert...
We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert channel...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
An interrupt is an event that alters the sequence of instructions executed by a processor and requir...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
Multi-process concurrency is effective in improving program efficiency and maximizing CPU utilizatio...
Interrupt-driven communication with hardware devices can be exploited for establishing covert ch...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Abstract We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert...
We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert channel...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
An interrupt is an event that alters the sequence of instructions executed by a processor and requir...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
Multi-process concurrency is effective in improving program efficiency and maximizing CPU utilizatio...