Mathematical analysis of possible covert timing channels is a requirement for certification of high assurance Multi-Level Secure (MLS) systems. In this dissertation, we present a mathematical approach for analysis of covert timing channels in MLS real-time systems. This approach includes an analytical model which can specify the types of real-time tasks running, the real-time scheduling algorithm in use, and real-time constraints imposed on task executions. Using this analytical real-time system model, we characterize timing vulnerabilities present in real-time systems, present a methodology for measuring covert timing channel capacity, and devise countermeasures to remove or mitigate the impact of covert timing channels. Finally, we presen...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Virtualization technology is nowadays adopted in security-critical embedded systems to achieve highe...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Virtualization technology is nowadays adopted in security-critical embedded systems to achieve highe...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...