The following pages link to Transforming out timing leaks (Q5178841):
Displaying 16 items.
- The complexity of synchronous notions of information flow security (Q278742) (← links)
- Relational bytecode correlations (Q710672) (← links)
- Securing interaction between threads and the scheduler in the presence of synchronization (Q843217) (← links)
- Typing noninterference for reactive programs (Q997991) (← links)
- Tempus fugit: How to plug it (Q997994) (← links)
- Noninterference for concurrent programs and thread systems (Q1603688) (← links)
- Specification and static enforcement of scheduler-independent noninterference in a middleweight Java (Q1749145) (← links)
- A better composition operator for quantitative information flow analyses (Q2167722) (← links)
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory (Q2228439) (← links)
- Formal verification of side-channel countermeasures using self-composition (Q2442950) (← links)
- Efficient Information-Flow Verification Under Speculative Execution (Q3297608) (← links)
- Timing-Sensitive Noninterference through Composition (Q3304803) (← links)
- More Typed Assembly Languages for Confidentiality (Q3498434) (← links)
- Flexible dynamic information flow control in the presence of exceptions (Q5371997) (← links)
- (Q5856419) (← links)
- Timing-Sensitive Information Flow Analysis for Synchronous Systems (Q5862523) (← links)