Abstract
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.
| Original language | English |
|---|---|
| Pages (from-to) | 173-190 |
| Number of pages | 18 |
| Journal | Journal of Logic and Algebraic Programming |
| Volume | 72 |
| Issue number | 2 |
| DOIs | |
| State | Published - Jul 2007 |
| Externally published | Yes |
Keywords
- Probabilistic processes
- Program transformation
- Security analysis
- Timing leaks
Fingerprint
Dive into the research topics of 'Tempus fugit: How to plug it'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver