Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secrets affect the timing behavior of a thread, which, via the scheduler, affects the interleaving of assignments to public variables. This channel is particularly dangerous because, in contrast to external timing, the attacker does not need to observe the actual execution time. This paper presents a compositional transformation that closes the internal timing channel for multithreaded programs (or rejects the program if there are symptoms of other flows). The transformation is based on spawning dedicated threads, whenever computation may affect secrets, and carefully ...
International audienceConstant-time is a programming discipline which protects security sensitive co...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
The problem of controlling information flow in multithreaded programs remains an important open chal...
The problem of controlling information flow in multithreaded programs remains an important open cha...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
Timing channels constitute one form of covert channels through which programs may be leaking informa...
When termination of a program is observable by an adversary, confidential information may be leaked ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
We propose a new language-based approach to mitigating timing channels. In this language, well-typed...
The problem of information flow in multithreaded programs remains an important open challenge. Exist...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
We propose a new language-based approach to mitigating timing channels. In this lan-guage, well-type...
International audienceConstant-time is a programming discipline which protects security sensitive co...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
The problem of controlling information flow in multithreaded programs remains an important open chal...
The problem of controlling information flow in multithreaded programs remains an important open cha...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
When termination of a program is observable by an adversary, con-fidential information may be leaked...
Timing channels constitute one form of covert channels through which programs may be leaking informa...
When termination of a program is observable by an adversary, confidential information may be leaked ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
The work presented in this thesis focusses on dealing with timingcovert channels in dynamic informat...
We propose a new language-based approach to mitigating timing channels. In this language, well-typed...
The problem of information flow in multithreaded programs remains an important open challenge. Exist...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
We propose a new language-based approach to mitigating timing channels. In this lan-guage, well-type...
International audienceConstant-time is a programming discipline which protects security sensitive co...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...