[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/882495.884442guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On Confidentiality and Algorithms

Published: 14 May 2001 Publication History

Abstract

Abstract: Recent interest in methods for certifying programs for secure information flow (noninterference) have failed to raise a key question: can efficient algorithms be written so as to satisfy the requirements of secure information flow? In this paper we discuss how algorithms for searching and sorting can be adapted to work on collections of secret data without leaking any confidential information, either directly, indirectly, or through timing behaviour. We pay particular attention to the issue of timing channels caused by cache behaviour, and argue that it is necessary to disable the effect of the cache in order to construct algorithms manipulating pointers to objects in such a way that they satisfy the conditions of noninterference. We also discuss how randomisation can be used to implement secure algorithms, and discuss how randomised hash tables might be made practically secure.

Cited By

View all
  • (2018)A unifying approach to the security of distributed and multi-threaded programsJournal of Computer Security10.5555/959088.95909411:4(615-676)Online publication date: 24-Dec-2018
  • (2015)CacheAuditACM Transactions on Information and System Security (TISSEC)10.1145/275655018:1(1-32)Online publication date: 9-Jun-2015
  • (2013)Certified computer-aided cryptographyProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516652(1217-1230)Online publication date: 4-Nov-2013
  • Show More Cited By
  1. On Confidentiality and Algorithms

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy
    May 2001

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 14 May 2001

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)A unifying approach to the security of distributed and multi-threaded programsJournal of Computer Security10.5555/959088.95909411:4(615-676)Online publication date: 24-Dec-2018
    • (2015)CacheAuditACM Transactions on Information and System Security (TISSEC)10.1145/275655018:1(1-32)Online publication date: 9-Jun-2015
    • (2013)Certified computer-aided cryptographyProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516652(1217-1230)Online publication date: 4-Nov-2013
    • (2009)Specification and verification of side channel declassificationProceedings of the 6th international conference on Formal Aspects in Security and Trust10.1007/978-3-642-12459-4_9(111-125)Online publication date: 5-Nov-2009
    • (2005)Securing Statically-verified Communications Protocols Against Timing AttacksElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/j.entcs.2005.01.016128:4(123-143)Online publication date: 1-Apr-2005
    • (2001)A Generic Approach to the Security of Multi-Threaded ProgramsProceedings of the 14th IEEE workshop on Computer Security Foundations10.5555/872752.873516Online publication date: 11-Jun-2001

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media