Timing Aware Information Flow Security for a JavaCard-Like Bytecode

Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even though they pose a serious threat. A typical covert channel is to use the timing of certain events to carry information. The authors present a timing-aware information-flow type system for a low-level language similar to a non-trivial subset of a sequential Java bytecode.

Provided by: Reed Elsevier Topic: Software Date Added: Jan 2011 Format: PDF

Find By Topic