Sciweavers

POPL
2000
ACM

Transforming Out Timing Leaks

13 years 9 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that wants to differentiate two processes, presented as probabilistic transition systems, by observing their timing behaviour. Our goal is to make the processes indistinguishable i.e. bisimilar, by adding virtual (dummy) states and transitions to the original processes (padding). Instead of padding the processes with whole virtual copies of their counterparts - as done by some padding algorithms - we present an algorithm that uses the bisimulation equivalence relation computed as a lumping partition - as the main criterion to optimise the padding procedure. Key words: Timing attacks, padding, covert channels, bisimulation, probabilistic transition systems.
Johan Agat
Added 01 Aug 2010
Updated 01 Aug 2010
Type Conference
Year 2000
Where POPL
Authors Johan Agat
Comments (0)