Resumen
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.
| Idioma original | Inglés |
|---|---|
| Páginas (desde-hasta) | 173-190 |
| Número de páginas | 18 |
| Publicación | Journal of Logic and Algebraic Programming |
| Volumen | 72 |
| N.º | 2 |
| DOI | |
| Estado | Publicada - jul. 2007 |
| Publicado de forma externa | Sí |
Huella
Profundice en los temas de investigación de 'Tempus fugit: How to plug it'. En conjunto forman una huella única.Citar esto
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver