Transforming out timing leaks
From MaRDI portal
Publication:5178841
DOI10.1145/325694.325702zbMath1323.68399OpenAlexW1997775274MaRDI QIDQ5178841
Publication date: 17 March 2015
Published in: Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/325694.325702
Cryptography (94A60) Semantics in the theory of computing (68Q55) Specification and verification (program logics, model checking, etc.) (68Q60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items
The complexity of synchronous notions of information flow security, Securing interaction between threads and the scheduler in the presence of synchronization, A better composition operator for quantitative information flow analyses, Unnamed Item, More Typed Assembly Languages for Confidentiality, Output-sensitive information flow analysis, Flexible dynamic information flow control in the presence of exceptions, Formal verification of side-channel countermeasures using self-composition, Efficient Information-Flow Verification Under Speculative Execution, System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory, Timing-Sensitive Noninterference through Composition, Specification and static enforcement of scheduler-independent noninterference in a middleweight Java, Relational bytecode correlations, Typing noninterference for reactive programs, Tempus fugit: How to plug it, Timing-Sensitive Information Flow Analysis for Synchronous Systems, Noninterference for concurrent programs and thread systems