2011 IEEE Symposium on Security and Privacy 2011
DOI: 10.1109/sp.2011.19
|View full text |Cite
|
Sign up to set email alerts
|

Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach

Abstract: Abstract-Secure information flow guarantees the secrecy and integrity of data, preventing an attacker from learning secret information (secrecy) or injecting untrusted information (integrity). Covert channels can be used to subvert these security guarantees; for example, timing and termination channels can, either intentionally or inadvertently, violate these guarantees by modifying the timing or termination behavior of a program based on secret or untrusted data. Attacks using these covert channels have been … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
61
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(63 citation statements)
references
References 38 publications
1
61
1
Order By: Relevance
“…FlowFox multi-executes scripts and event handlers using a low-priority scheduler [34] (see Section 3.1.2 and Section 3.3) on a per-event basis. A fundamental limitation of this type of scheduling is that it does not offer timing-sensitive non-interference.…”
Section: Limitations and Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…FlowFox multi-executes scripts and event handlers using a low-priority scheduler [34] (see Section 3.1.2 and Section 3.3) on a per-event basis. A fundamental limitation of this type of scheduling is that it does not offer timing-sensitive non-interference.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…These initial results were improved and extended in several ways: Kashyap et al [34], generalize the technique of secure multi-execution to a family of techniques that they call the scheduling approach to non-interference, and they analyze how the scheduling strategy can impact the security properties offered. Jaskelioff and Russo [30] propose a monadic library to realize secure multi-execution in Haskell, and Barthe et al [11] propose a program transformation that simulates SME.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…In this scenario, cache-based attacks can only be removed in specific configurations [14] (e.g., when there are as many CPU cores as security levels).…”
Section: Related Workmentioning
confidence: 99%
“…In this scenario, the cachebased covert channel can only be removed in specific configurations [16]. Zhang et al [49] provide a method to mitigate external events when their timing behavior could be affected by the underlying hardware.…”
Section: Related Workmentioning
confidence: 99%