International audienceConstant-time is a programming discipline which protects security sensitive code against a wide class of timing attacks. This discipline can be formalised as a non-interference property and enforced by an information flow type system which prevents branching and memory accesses over secret data. We propose a relaxed information flow type system which tracks indirect flows but only rejects programs leaking secrets through direct flows. The main result of this paper is that any program that is accepted using this relaxed type system can be transformed automatically into a semantically equivalent constant-time program. Our algorithms are implemented in the jasmin compiler and validated against synthetic programs
The problem of controlling information flow in multithreaded programs remains an important open chal...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
International audienceConstant-time is a programming discipline which protects security sensitive co...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate a...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Side-channel attacks are an especially dangerous form of attack. In this thesis, we focus on the tim...
Starting from the seminal work of Volpano and Smith, there has been growing evidence that type syste...
International audienceCryptographic constant-time (CT) is a popular programming discipline used by c...
The constant-time discipline is a software-based countermeasure used for protecting high assurance c...
Constant-time implementations are a popular approach for defending against cache-timing attacks. It ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
The problem of controlling information flow in multithreaded programs remains an important open chal...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...
International audienceConstant-time is a programming discipline which protects security sensitive co...
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to...
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate a...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
As the title suggests, this thesis consists of two parts that address two rather different topics. T...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Side-channel attacks are an especially dangerous form of attack. In this thesis, we focus on the tim...
Starting from the seminal work of Volpano and Smith, there has been growing evidence that type syste...
International audienceCryptographic constant-time (CT) is a popular programming discipline used by c...
The constant-time discipline is a software-based countermeasure used for protecting high assurance c...
Constant-time implementations are a popular approach for defending against cache-timing attacks. It ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
The problem of controlling information flow in multithreaded programs remains an important open chal...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitor...