Sciweavers

22 search results - page 2 / 5
» csfw 2007
Sort
View
CSFW
2007
IEEE
13 years 11 months ago
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
Heiko Mantel, Henning Sudbrock
CSFW
2007
IEEE
13 years 11 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...
CSFW
2007
IEEE
13 years 11 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
CSFW
2007
IEEE
13 years 11 months ago
Collaborative Planning With Privacy
Collaboration among organizations or individuals is common. While these participants are often unwilling to share all their information with each other, some information sharing i...
Max I. Kanovich, Paul Rowe, Andre Scedrov
CSFW
2007
IEEE
13 years 8 months ago
Secure information flow and program logics
We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-l...
Lennart Beringer, Martin Hofmann