2015
DOI: 10.1007/978-3-319-24174-6_23
|View full text |Cite
|
Sign up to set email alerts
|

Transforming Out Timing Leaks, More or Less

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
27
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 49 publications
2
27
0
Order By: Relevance
“…Another concern is their general applicability, given the complexity of modern runtimes. A recent empirical study by Mantel and Starostin [23] investigates performance and security implications of these techniques, but as an initial step in this direction the paper [23] has a number of simplifying assumptions, such as disabled JIT optimizations and non-malicious code.…”
Section: Scheduler-independent Approachesmentioning
confidence: 99%
“…Another concern is their general applicability, given the complexity of modern runtimes. A recent empirical study by Mantel and Starostin [23] investigates performance and security implications of these techniques, but as an initial step in this direction the paper [23] has a number of simplifying assumptions, such as disabled JIT optimizations and non-malicious code.…”
Section: Scheduler-independent Approachesmentioning
confidence: 99%
“…There are other papers dealing with Information Flow using language based techniques for programs with a notion of time [2,9,16,22] or programs that leak information intentionally [6,13,[19][20][21]24]. Our contribution focuses on the challenges of continuous time and the guarded actions of timed automata.…”
Section: Contributionmentioning
confidence: 99%
“…In our experiments, we use the RSA modular exponentiation (modExp) to encrypt or decrypt a message [13] from the benchmark suite introduced in [14] and modular multiplication (mulMod16) from the IDEA cipher [15]. Since these programs originate from practical cryptographic algorithms with different degrees of sophistication, they are meaningful candidates for the evaluations.…”
Section: A Benchmark Programsmentioning
confidence: 99%