On Modelling Real-time and Security properties of Distributed Systems (Extended Abstract)

We discuss a simplified version of the timing attack to illustrate a connection between security and real-time properties of distributed systems. We suggest several avenues for further research on this and similar connections.

[1]  Paul C. van Oorschot,et al.  White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.

[2]  Martín Abadi,et al.  Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.

[3]  Marcos A. Kiwi,et al.  Strength of two data encryption standard implementations under timing attacks , 1998, TSEC.

[4]  Gavin Lowe Casper: a compiler for the analysis of security protocols , 1998 .

[5]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[6]  Eli Biham,et al.  Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.

[7]  Joost-Pieter Katoen,et al.  Modelling stochastic timed systems , 2001 .

[8]  Suresh Chari,et al.  A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .

[9]  Wang Yi,et al.  UPPAAL - Now, Next, and Future , 2000, MOVEP.

[10]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[11]  Khawaja Amer Hayat,et al.  Password Interception in a SSL/TLS Channel , 2004 .

[12]  Sandro Etalle,et al.  An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.

[13]  Howard M. Heys,et al.  A Timing Attack on RC5 , 1998, Selected Areas in Cryptography.

[14]  Rajeev Alur,et al.  A Theory of Timed Automata , 1994, Theor. Comput. Sci..

[15]  Joost-Pieter Katoen,et al.  MoDeST - A Modelling and Description Language for Stochastic Timed Systems , 2001, PAPM-PROBMIV.

[16]  S. Hamilton,et al.  Network Security Under Siege , 1996, Computer.

[17]  Henk L. Muller,et al.  Non-deterministic Processors , 2001, ACISP.

[18]  Johan Agat,et al.  Transforming out timing leaks , 2000, POPL '00.