Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation. We propose a novel approach for verifying constant-time programming based on a new information flow property, called output-sensitive non-interference. Noninterference states that a public observer cannot learn anything about the private data. Since real systems need to intentionally declassify some information, this property is too strong in practice. In order to take into account public outputs w...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Confidentiality is maybe the most popular security property to be formally or informally verified. N...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
International audienceConstant-time programming is an established discipline to secure programs agai...
International audienceCache-based attacks are a class of side-channel attacks that are particularly ...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
International audienceConstant-time programming is an established discipline to secure programs agai...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
With the intensification of communication in information systems, interest in security has increased...
The constant-time programming discipline is an effective countermeasure against timing attacks, whic...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Confidentiality is maybe the most popular security property to be formally or informally verified. N...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
International audienceConstant-time programming is an established discipline to secure programs agai...
International audienceCache-based attacks are a class of side-channel attacks that are particularly ...
We present an information flow monitoring mechanism for sequential programs. The monitor executes a ...
International audienceConstant-time programming is an established discipline to secure programs agai...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
With the intensification of communication in information systems, interest in security has increased...
The constant-time programming discipline is an effective countermeasure against timing attacks, whic...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Confidentiality is maybe the most popular security property to be formally or informally verified. N...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...