19th IEEE Computer Security Foundations Workshop (CSFW'06)
DOI: 10.1109/csfw.2006.6
|View full text |Cite
|
Sign up to set email alerts
|

A Temporal Logic Characterisation of Oservational Determinism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
108
1

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(110 citation statements)
references
References 19 publications
0
108
1
Order By: Relevance
“…Zdancewic and Myers introduce observational low-determinism [46], which intuitively states that the observable behavior of concurrent systems must be deterministic. After this seminal work, several authors improve on each other's definitions on low-determinism (e.g., [14]). Other IFC systems rely on deterministic semantics and a determined class of runtime schedulers (e.g., [32]).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Zdancewic and Myers introduce observational low-determinism [46], which intuitively states that the observable behavior of concurrent systems must be deterministic. After this seminal work, several authors improve on each other's definitions on low-determinism (e.g., [14]). Other IFC systems rely on deterministic semantics and a determined class of runtime schedulers (e.g., [32]).…”
Section: Related Workmentioning
confidence: 99%
“…Several IFC systems, including [13,14,32,38,40,46], model internal timing attacks and address them by ensuring that the outcome of a race to a public resource does not depend on secret data. Unfortunately, these systems only account for resources explicitly modeled at the programming language level and not underlying OS or hardware state, such as the CPU cache or TLB.…”
Section: Cache Attacks and Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…In a concurrent setting, Huisman et al (2006) have recently proposed a characterization of observational determinism (Zdancewic and Myers 2003) using self-composition. Their characterization uses temporal logics and is thus amenable to model-checking after a suitable program abstraction has been constructed.…”
Section: Related Workmentioning
confidence: 99%
“…Intuitively, observational determinism expresses that a multi-threaded program is secure when its publicly observable traces are deterministic and independent of its private data. Several formal definitions are proposed in the literature, e.g., by [96,48,87], but none of them captures this intuition exactly, i.e., they accept insecure programs, since their formalizations of deterministic behavior are not precise. Besides, these definitions also claim that they are schedulerindependent, i.e, they are resistant to refinement attacks.…”
Section: Non-deterministic Multi-threaded Programsmentioning
confidence: 99%