Filling Out the Gaps: A Padding Algorithm for Transforming Out Timing Leaks
Author(s) -
Igor Siveroni
Publication year - 2006
Publication title -
electronic notes in theoretical computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.242
H-Index - 60
ISSN - 1571-0661
DOI - 10.1016/j.entcs.2005.10.041
Subject(s) - padding , covert , computer science , algorithm , bisimulation , probabilistic logic , theoretical computer science , partition (number theory) , mathematics , computer security , combinatorics , artificial intelligence , philosophy , linguistics
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that wants to differentiate two processes, presented as probabilistic transition systems, by observing their timing behaviour. Our goal is to make the processes indistinguishable i.e. bisimilar, by adding virtual (dummy) states and transitions to the original processes (padding). Instead of padding the processes with whole virtual copies of their counterparts - as done by some padding algorithms - we present an algorithm that uses the bisimulation equivalence relation - computed as a lumping partition - as the main criterion to optimise the padding procedure
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom