Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,297,185 papers from all fields of science
Search
Sign In
Create Free Account
Timing channel
Known as:
Timing channels
A timing channel is one example of a covert channel for passing unauthorized information, in which one process signals information to another process…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Covert channel
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Steganographic Internet of Things: Graph Topology Timing Channels
I. S. Moskowitz
,
S. Russell
,
B. Jalaeian
AAAI Workshops
2018
Corpus ID: 51879974
Given the self-aware, artificially intelligent, and complex system-of-systems nature of the Internet of Things (IoT), un-intended…
Expand
2014
2014
Development of a concurrency control technique for multilevel secure databases
P. Sapra
,
Suresh Kumar
International Conference on Reliability…
2014
Corpus ID: 14256990
Multilevel secure database systems are the systems in which security classifications are assigned from the relations to data…
Expand
2013
2013
Investigating the Dynamics of Canonical Flux Tubes
J. V. D. Linden
2013
Corpus ID: 126158740
Observations indicate that the dynamics of plasmas in our cosmos, the heliosphere, and terrestrial experiments can involve…
Expand
2012
2012
Covert and side channels in buildings and the prototype of a building-aware active warden
S. Wendzel
IEEE International Conference on Communications…
2012
Corpus ID: 15022158
Covert channels and side channels are barely discussed topics in the area of building automation. We define a building in the…
Expand
2012
2012
Mitigating Timing Channels in Clouds using StopWatch ∗
Peng Li
,
Debin Gao
,
M. Reiter
2012
Corpus ID: 17814272
This paper presents StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of…
Expand
2009
2009
Camouflaging Timing Channels in Web Traffic
Sarah H. Sellke
,
Chih-Chun Wang
,
S. Bagchi
,
N. Shroff
2009
Corpus ID: 3181526
Web traffic accounts for more than half of Internet traffic tod ay. Camouflaging covert timing channels in Web traffic would be…
Expand
2007
2007
Transforming out Timing Leaks in Practice An Experiment in Implementing Programming Language-Based Methods for Con dentiality
Johan Agat
2007
Corpus ID: 18269070
When it comes to granting mobile code access to conndential information , great care has to be taken if the code originates from…
Expand
Review
2006
Review
2006
Information Theory of Covert Timing Channels 1
Aaron B. Wagner
,
V. Anantharam
2006
Corpus ID: 5744887
We review our recent work on the reliability function of the timing channel associated to the first in first out exponential…
Expand
2006
2006
Timing Channel Capacity for Uniform and Gaussian Servers
Sarah H. Sellke
,
N. Shroff
,
S. Bagchi
,
Chih-Chun Wang
2006
Corpus ID: 9098515
It is well known that queues with exponentially distributed service time have the smallest Shannon capacity among all single…
Expand
2005
2005
Suburban ad-hoc Networks in information warfare
M. Islam
,
R. Pose
,
C. Kopp
2005
Corpus ID: 86641494
Wireless ad-hoc networks are vulnerable partly due to the absence of a clear physical boundary. A simple yet robust network layer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE