TY - JOUR
T1 - Tempus fugit
T2 - How to plug it
AU - Di Pierro, Alessandra
AU - Hankin, Chris
AU - Siveroni, Igor
AU - Wiklicky, Herbert
N1 - Funding Information:
All authors are partly funded by the EPSRC project S77066A. ∗ Corresponding author. Tel.: +44 207 594 5010; fax: +44 207 594 8802. E-mail address: [email protected] (C. Hankin).
PY - 2007/7
Y1 - 2007/7
N2 - Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.
AB - Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.
KW - Probabilistic processes
KW - Program transformation
KW - Security analysis
KW - Timing leaks
UR - http://www.scopus.com/inward/record.url?scp=34250629239&partnerID=8YFLogxK
U2 - 10.1016/j.jlap.2007.02.007
DO - 10.1016/j.jlap.2007.02.007
M3 - Article
AN - SCOPUS:34250629239
SN - 1567-8326
VL - 72
SP - 173
EP - 190
JO - Journal of Logic and Algebraic Programming
JF - Journal of Logic and Algebraic Programming
IS - 2
ER -