International audienceHigh-security processes have to load confidential information into shared resources as part of their operation. This confidential information may be leaked (directly or indirectly) to low-security processes via the shared resource. This paper considers leakage from high-security to low-security processes from the perspective of scheduling. The workflow model is here extended to support preemption, security levels, and leakage. Formalization of leakage properties is then built upon this extended model, allowing formal reasoning about the security of schedulers. Several heuristics are presented in the form of compositional preprocessors and postprocessors as part of a more general scheduling approach. The effectiveness o...
In today's information-based society, guaranteeing information security plays an important role in a...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user ...
International audienceHigh-security processes have to load confidential information into shared reso...
Covert- and side-channel attacks, typically enabled by the usage of shared resources, pose a serious...
International audienceQuantitative information flow analyses measure how much information on secrets...
When multiple job processes are served by a single scheduler, the queueing delays of one process are...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
Modern applications often operate on data in multiple administrative domains. In this federated set...
International audienceMany security properties of interest are captured by instrumented semantics th...
The problem of controlling information flow in multithreaded programs remains an important open chal...
This dissertation presents a survey of the theoretical and practical techniques necessary to provabl...
Information flow security concerns how to protect sensitive data in computer systems by avoiding und...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
The problem of controlling information flow in multithreaded programs remains an important open chal...
In today's information-based society, guaranteeing information security plays an important role in a...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user ...
International audienceHigh-security processes have to load confidential information into shared reso...
Covert- and side-channel attacks, typically enabled by the usage of shared resources, pose a serious...
International audienceQuantitative information flow analyses measure how much information on secrets...
When multiple job processes are served by a single scheduler, the queueing delays of one process are...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
Modern applications often operate on data in multiple administrative domains. In this federated set...
International audienceMany security properties of interest are captured by instrumented semantics th...
The problem of controlling information flow in multithreaded programs remains an important open chal...
This dissertation presents a survey of the theoretical and practical techniques necessary to provabl...
Information flow security concerns how to protect sensitive data in computer systems by avoiding und...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
The problem of controlling information flow in multithreaded programs remains an important open chal...
In today's information-based society, guaranteeing information security plays an important role in a...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user ...