{"title":"输出敏感信息流分析","authors":"Cristian Ene, L. Mounier, Marie-Laure Potet","doi":"10.23638/LMCS-17(1:15)2021","DOIUrl":null,"url":null,"abstract":"Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation.","PeriodicalId":448077,"journal":{"name":"Formal Techniques for (Networked and) Distributed Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Output-Sensitive Information Flow Analysis\",\"authors\":\"Cristian Ene, L. Mounier, Marie-Laure Potet\",\"doi\":\"10.23638/LMCS-17(1:15)2021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation.\",\"PeriodicalId\":448077,\"journal\":{\"name\":\"Formal Techniques for (Networked and) Distributed Systems\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Formal Techniques for (Networked and) Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23638/LMCS-17(1:15)2021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Formal Techniques for (Networked and) Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23638/LMCS-17(1:15)2021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation.