Sciweavers

48 search results - page 3 / 10
» Hide and Seek in Time - Robust Covert Timing Channels
Sort
View
PET
2004
Springer
13 years 10 months ago
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...
CN
2011
95views more  CN 2011»
13 years 2 days ago
Liquid: A detection-resistant covert timing channel based on IPD shaping
Robert J. Walls, Kush Kothari, Matthew K. Wright
TSE
2010
120views more  TSE 2010»
13 years 3 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
ENTCS
2006
145views more  ENTCS 2006»
13 years 5 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...