2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282563
|View full text |Cite
|
Sign up to set email alerts
|

Capacity limit of queueing timing channel in shared FCFS schedulers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 7 publications
0
20
0
Order By: Relevance
“…It is worth noting that L c (X→Y ), similarly to maximal leakage, depends on P XY only through P Y |X and the support of P X . Moreover, a relation analogous to (2) holds for L c (X→Y ):…”
Section: E Maximal Cost Leakagementioning
confidence: 99%
See 1 more Smart Citation
“…It is worth noting that L c (X→Y ), similarly to maximal leakage, depends on P XY only through P Y |X and the support of P X . Moreover, a relation analogous to (2) holds for L c (X→Y ):…”
Section: E Maximal Cost Leakagementioning
confidence: 99%
“…(e.g., memory access patterns) and can leak sensitive information such as keys. Similar phenomena occur when users share links or buffers in a communication network [2]. • Consider the Shannon cipher system (shown in Figure 2) in which a transmitter and a receiver are connected through a public noiseless channel and share a secret key.…”
Section: Introductionmentioning
confidence: 97%
“…H A α (X|Y ) is Arimoto conditional entropy of X given Y in (11). For α = ∞, the expression of H A ∞ (X|Y ) is…”
Section: A α-Loss Functionmentioning
confidence: 99%
“…Moreover, practical implementations of cryptographic schemes are susceptible to so-called "side-channel attacks," where sensitive information leaks through unexpected channels. For example, a malicious application may get timing characteristics [11], [12]. In these examples, an adversary that observes information leaked through a side-channel can more reliably infer private data, such as a key or a plaintext.…”
Section: Introduction and Overviewmentioning
confidence: 99%
“…There has also been some work on information flow via schedulers. The problem where two tasks leak private information by using a covert channel is studied [2], [3]. Völp et al [1], [29] examined covert channels between different priorities of real-time tasks and proposed solutions to avoid such covert channels.…”
Section: Related Workmentioning
confidence: 99%