Timing channel

Known as: Timing channels 
A timing channel is one example of a covert channel for passing unauthorized information, in which one process signals information to another process… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit… (More)
  • figure 1
  • table 1
  • table 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only… (More)
  • figure 3
  • figure 5
  • table 1
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Timing channels remain a difficult and important problem for information security. Recent work introduced predictive mitigation… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Timing side-channels represent an insidious security challenge for cloud computing, because: (a) massive parallelism in the cloud… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
There has been significant recent interest in covert communication using timing channels. In network timing channels, information… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Wireless communication is susceptible to radio interference, which prevents the reception of communications. Although evasion… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper focuses on jammed timing channels. Pure delay jammers with a maximum delay constraint, an average delay constraint, or… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 8
Is this relevant?