Abstract
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that wants to differentiate two processes, presented as probabilistic transition systems, by observing their timing behaviour. Our goal is to make the processes indistinguishable i.e. bisimilar, by adding virtual (dummy) states and transitions to the original processes (padding). Instead of padding the processes with whole virtual copies of their counterparts - as done by some padding algorithms - we present an algorithm that uses the bisimulation equivalence relation - computed as a lumping partition - as the main criterion to optimise the padding procedure.
| Original language | English |
|---|---|
| Pages (from-to) | 241-257 |
| Number of pages | 17 |
| Journal | Electronic Notes in Theoretical Computer Science |
| Volume | 153 |
| Issue number | 2 SPEC. ISS. |
| DOIs | |
| State | Published - 23 May 2006 |
| Externally published | Yes |
Keywords
- Timing attacks
- bisimulation
- covert channels
- padding
- probabilistic transition systems
Fingerprint
Dive into the research topics of 'Filling Out the Gaps: A Padding Algorithm for Transforming Out Timing Leaks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver