Skip to main navigation Skip to search Skip to main content

Tempus fugit: How to plug it

  • Alessandra Di Pierro
  • , Chris Hankin
  • , Igor Siveroni
  • , Herbert Wiklicky

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.

Original languageEnglish
Pages (from-to)173-190
Number of pages18
JournalJournal of Logic and Algebraic Programming
Volume72
Issue number2
DOIs
StatePublished - Jul 2007
Externally publishedYes

Keywords

  • Probabilistic processes
  • Program transformation
  • Security analysis
  • Timing leaks

Fingerprint

Dive into the research topics of 'Tempus fugit: How to plug it'. Together they form a unique fingerprint.

Cite this