A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis
暂无分享,去创建一个
[1] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[2] Jonathan K. Millen,et al. Covert Channel Capacity , 1987, 1987 IEEE Symposium on Security and Privacy.
[3] Ruby B. Lee,et al. New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation , 2005, ISC.
[4] James W. Gray,et al. Countermeasures and tradeoffs for a class of covert timing channels , 1994 .
[5] Oliver Costich,et al. Analysis of a storage channel in the two phase commit protocol , 1991, Proceedings Computer Security Foundations Workshop IV.
[6] Cecilia R. Aragon,et al. Randomized search trees , 1989, 30th Annual Symposium on Foundations of Computer Science.
[7] Wei-Ming Hu,et al. Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[9] Clark Weissman. Handbook for the Computer Security Certification of Trusted Systems , 1995 .
[10] Anneli Folkesson,et al. Secure Computer Systems , 2013 .
[11] John C. Wray. An Analysis of Covert Timing Channels , 1992, J. Comput. Secur..
[12] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[13] Leonidas J. Guibas,et al. A dichromatic framework for balanced trees , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).
[14] Hermann Härtig,et al. Avoiding timing channels in fixed-priority schedulers , 2008, ASIACCS '08.
[15] Richard A. Kemmerer,et al. Covert flow trees: a technique for identifying and analyzing covert storage channels , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] M. AdelsonVelskii,et al. AN ALGORITHM FOR THE ORGANIZATION OF INFORMATION , 1963 .
[17] Sushil Jajodia,et al. Transaction processing in multilevel-secure databases using replicated architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[19] Virgil D. Gligor,et al. A Formal Method for the Identification of Covert Storage Channels in Source Code , 1987, 1987 IEEE Symposium on Security and Privacy.
[20] Xiang Cai,et al. Exploiting Unix File-System Races via Algorithmic Complexity Attacks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[21] Ira S. Moskowitz,et al. The channel capacity of a certain noisy timing channel , 1992, IEEE Trans. Inf. Theory.