Tempus fugit: How to plug it

Code (set theory) Plug and play TEMPUS Plug-in
DOI: 10.1016/j.jlap.2007.02.007 Publication Date: 2007-02-25T11:57:41Z
ABSTRACT
AbstractSecret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of this situation in terms of a confinement property, we present an algorithm which is able to transform the system into one that is computationally equivalent to the given system but free of timing leaks.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (24)
CITATIONS (5)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....