Timing-Sensitive Synchronization for Efficient Secure Multi-Execution
Abstract
References
Index Terms
- Timing-Sensitive Synchronization for Efficient Secure Multi-Execution
Recommendations
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent
CSF '13: Proceedings of the 2013 IEEE 26th Computer Security Foundations SymposiumRecently, much progress has been made on achieving information-flow security via secure multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by executing a given program multiple times, once for each security level, while ...
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
SP '11: Proceedings of the 2011 IEEE Symposium on Security and PrivacySecure information flow guarantees the secrecy and integrity of data, preventing an attacker from learning secret information (secrecy) or injecting untrusted information (integrity). Covert channels can be used to subvert these security guarantees, for ...
Faceted Secure Multi Execution
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityTo enforce non-interference, both Secure Multi-Execution (SME) and Multiple Facets (MF) rely on the introduction of multi-executions. The attractiveness of these techniques is that they are precise: secure programs running under SME or MF do not change ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 125Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in