A Case Study in Helping Students to Covertly Eat Their Classmates
暂无分享,去创建一个
[1] Randy Browne,et al. Mode security: an infrastructure for covert channel suppression , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] A. Tanenbaum. Computer recreations , 1973 .
[3] Ira S. Moskowitz,et al. A pump for rapid, reliable, secure communication , 1993, CCS '93.
[4] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[5] Gaurav Shah,et al. Keyboards and Covert Channels , 2006, USENIX Security Symposium.
[6] Randy Browne. An entropy conservation law for testing the completeness of covert channel analysis , 1994, CCS '94.
[7] Paul Walton,et al. A Model for Information , 2014, Inf..
[8] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[9] Danfeng Zhang,et al. Predictive black-box mitigation of timing channels , 2010, CCS '10.
[10] Landon P. Cox,et al. TightLip: Keeping Applications from Spilling the Beans , 2007, NSDI.
[11] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[12] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[13] Deepak Kapur,et al. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking , 2010, USENIX Security Symposium.
[14] Zhuoqing Morley Mao,et al. Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security , 2012, 2012 IEEE Symposium on Security and Privacy.
[15] Jonathan K. Millen. 20 years of covert channel modeling and analysis , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[16] Randy Brown,et al. The Turing Test and Non-Information Flow , 1991, IEEE Symposium on Security and Privacy.
[17] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[18] Michael R. Clarkson,et al. Belief in information flow , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[19] XiaoFeng Wang,et al. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems , 2009, USENIX Security Symposium.
[20] Jedidiah R. Crandall,et al. Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper , 2012, CSET.
[21] Vitaly Shmatikov,et al. Memento: Learning Secrets from Process Footprints , 2012, 2012 IEEE Symposium on Security and Privacy.