Software

Timing Aware Information Flow Security for a JavaCard-Like Bytecode

Free registration required

Executive Summary

Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even though they pose a serious threat. A typical covert channel is to use the timing of certain events to carry information. The authors present a timing-aware information-flow type system for a low-level language similar to a non-trivial subset of a sequential Java bytecode.

  • Format: PDF
  • Size: 218 KB