Download now Free registration required
Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even though they pose a serious threat. A typical covert channel is to use the timing of certain events to carry information. The authors present a timing-aware information-flow type system for a low-level language similar to a non-trivial subset of a sequential Java bytecode.
- Format: PDF
- Size: 218 KB