Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
The control flow of common processors does not match the specific needs of reactive systems. Key issues for these systems are preemption and concurrency, combined with timing pred...
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Abstract-- Distributed detection of information flows by timing analysis is considered. Timing measurements are subject to perturbations and the insertion of chaff noise. Moreover,...