2008
DOI: 10.1007/978-3-540-88625-9_6
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying Timing Leaks and Cost Optimisation

Abstract: Abstract. We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of low variables. We then show how to measure the security of a program with respect to this notion via a computable estimate of the timing leakage and use this estimate for cost optimisation.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…Several approaches in language-based security use type systems to detect [13], eliminate [1], [4], or mitigate [22] timing leaks. Applying these languagebased approaches to cryptographic algorithms requires restrictive programming and precise knowledge about the time consumption of the individual instructions on the underlying machine.…”
Section: Related Workmentioning
confidence: 99%
“…Several approaches in language-based security use type systems to detect [13], eliminate [1], [4], or mitigate [22] timing leaks. Applying these languagebased approaches to cryptographic algorithms requires restrictive programming and precise knowledge about the time consumption of the individual instructions on the underlying machine.…”
Section: Related Workmentioning
confidence: 99%
“…It should automatically adjust the automaton A in such a way that A/Σ H becomes bisimilar to A \ Σ H . In this direction, Agat considers the aspect of time in isolation for deterministic systems [1], Di Pierro et al propose a framework where probabilistic systems are transformed to become time equivalent [20], finally, in [24] systems are transformed to become time probabilistic bisimilar.…”
Section: Discussionmentioning
confidence: 99%
“…In the literature, some proposals concerned with discrete-time extensions of noninterference have been proposed, e.g. in the setting of real-time process algebra [8] and probabilistic timed automata [12,7], while other time-based aspects of noninterference have been investigated in the general setting of Shannon information theory, see e.g. [13].…”
Section: Fine-grain Models and Noninterferencementioning
confidence: 99%