AbstractTiming channels constitute one form of covert channels through which programs may be leaking information about the confidential data they manipulate. Such timing channels are typically eliminated by design, employing ad-hoc techniques to avoid information leaks through execution time, or by program transformation techniques, that transform programs that satisfy some form of noninterference property into programs that are time-sensitive termination-sensitive non-interfering. However, existing program transformations are thus far confined to simple languages without objects nor exceptions.We introduce a program transformation that uses transaction mechanisms to prevent timing leaks in sequential object-oriented programs. Under some st...
International audienceConstant-time is a programming discipline which protects security sensitive co...
Side channels are unintended indirect flows of infor-mation revealed by physical executions of a com...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
Timing channels constitute one form of covert channels through which programs may be leaking informa...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the i...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
We propose a new language-based approach to mitigating timing channels. In this language, well-typed...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
The problem of controlling information flow in multithreaded programs remains an important open chal...
We propose a new language-based approach to mitigating timing channels. In this lan-guage, well-type...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
When termination of a program is observable by an adversary, confidential information may be leaked ...
The problem of controlling information flow in multithreaded programs remains an important open cha...
International audienceConstant-time is a programming discipline which protects security sensitive co...
Side channels are unintended indirect flows of infor-mation revealed by physical executions of a com...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
Timing channels constitute one form of covert channels through which programs may be leaking informa...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the i...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
We propose a new language-based approach to mitigating timing channels. In this language, well-typed...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
The problem of controlling information flow in multithreaded programs remains an important open chal...
We propose a new language-based approach to mitigating timing channels. In this lan-guage, well-type...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
When termination of a program is observable by an adversary, confidential information may be leaked ...
The problem of controlling information flow in multithreaded programs remains an important open cha...
International audienceConstant-time is a programming discipline which protects security sensitive co...
Side channels are unintended indirect flows of infor-mation revealed by physical executions of a com...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...