Tempus fugit: How to plug it

2007; Elsevier BV; Volume: 72; Issue: 2 Linguagem: Inglês

10.1016/j.jlap.2007.02.007

ISSN

1873-5940

Autores

Alessandra Di Pierro, Chris Hankin, Igor Siveroni, Herbert Wiklicky,

Tópico(s)

Advanced Malware Detection Techniques

Resumo

Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.

Referência(s)