Article ID Journal Published Year Pages File Type
431223 The Journal of Logic and Algebraic Programming 2007 18 Pages PDF
Abstract

Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.

Related Topics
Physical Sciences and Engineering Computer Science Computational Theory and Mathematics