{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:49:39Z","timestamp":1767138579411,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319051185","type":"print"},{"value":"9783319051192","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05119-2_12","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T04:36:28Z","timestamp":1394166988000},"page":"199-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems"],"prefix":"10.1007","author":[{"given":"Pablo","family":"Buiras","sequence":"first","affiliation":[]},{"given":"Amit","family":"Levy","sequence":"additional","affiliation":[]},{"given":"Deian","family":"Stefan","sequence":"additional","affiliation":[]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[]},{"given":"David","family":"Mazi\u00e8res","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Acii\u00e7mez, O.: Yet another microarchitectural attack:: exploiting I-cache. In: Proceedings of the 2007 ACM workshop on Computer security architecture, CSAW \u201907. ACM (2007)","DOI":"10.1145\/1314466.1314469"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Agat, J.: Transforming out timing leaks. In: Proceedings of the ACM Symposium on Principles of Programming Languages, pp. 40\u201353, January 2000","DOI":"10.1145\/325694.325702"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Barthe, G., Betarte, G., Campo, J., Luna, C.: Cache-leakage resilient OS isolation in an idealized model of virtualization. In: Proceedings of the IEEE Computer Security Foundations Symposium. IEEE Computer Society, June 2012","DOI":"10.1109\/CSF.2012.17"},{"key":"12_CR4","series-title":"LNCS","first-page":"382","volume-title":"ICALP 2001","author":"G Boudol","year":"2001","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 382\u2013395. Springer, Heidelberg (2001)"},{"issue":"1","key":"12_CR5","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0304-3975(02)00010-5","volume":"281","author":"G Boudol","year":"2002","unstructured":"Boudol, G., Castellani, I.: Non-interference for concurrent programs and thread systems. Theor. Comput. Sci. 281(1), 109\u2013130 (2002)","journal-title":"Theor. Comput. Sci."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Buiras, P., Levy, A., Stefan, D., Russo, A., Mazi\u00e8res, D.: A library for removing cache-based attacks in concurrent information flow systems: Extended version. http:\/\/www.cse.chalmers.se\/~buiras\/resLIO.html (2013)","DOI":"10.1007\/978-3-319-14128-2_12"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1017\/S0956796899003342","volume":"9","author":"K Claessen","year":"1999","unstructured":"Claessen, K.: A poor man\u2019s concurrency monad. J. Funct. Program. 9(3), 313\u2013323 (1999)","journal-title":"J. Funct. Program."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Devriese, D., Piessens, F.: Noninterference through secure multi-execution. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP \u201910. IEEE Computer Society (2010)","DOI":"10.1109\/SP.2010.15"},{"key":"12_CR9","unstructured":"Giffin, D.B., Levy, A., Stefan, D., Terei, D., Mazi\u00e8res, D., Mitchell, J., Russo, A.: Hails: protecting data privacy in untrusted web applications. In: Proceedings of the 10th Symposium on Operating Systems Design and Implementation, October 2012"},{"key":"12_CR10","unstructured":"Harrison, B.: Cheap (but functional) threads. J. Funct. Program. http:\/\/people.cs.missouri.edu\/~harrisonwl\/drafts\/CheapThreads.pdf (2004)"},{"key":"12_CR11","unstructured":"Harrison, W.L., Hook, J.: Achieving information flow security through precise control of effects. In: Proceedings of the IEEE Computer Security Foundations Workshop. IEEE Computer Society (2005)"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.entcs.2005.02.031","volume":"141","author":"D Hedin","year":"2005","unstructured":"Hedin, D., Sands, D.: Timing aware information flow security for a JavaCard-like bytecode. Electron. Notes Theor. Comput. Sci. 141(1), 163\u2013182 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"12_CR13","unstructured":"Jones, S.P., Gordon, A., Finne, S.: Concurrent Haskell. In: Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM (1996)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kashyap, V., Wiedermann, B., Hardekopf, B.: Timing- and termination-sensitive secure information flow: exploring a new approach. In: Proceedings of the IEEE Symposium on Security and Privacy. IEEE (2011)","DOI":"10.1109\/SP.2011.19"},{"key":"12_CR15","unstructured":"Kim, T., Peinado, M., Mainar-Ruiz, G.: STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud. In: Proceedings of the USENIX Conference on Security Symposium, Security\u201912. USENIX Association (2012)"},{"key":"12_CR16","series-title":"LNCS","first-page":"104","volume-title":"CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"12_CR17","series-title":"LNCS","first-page":"564","volume-title":"CAV 2012","author":"B K\u00f6pf","year":"2012","unstructured":"K\u00f6pf, B., Mauborgne, L., Ochoa, M.: Automatic quantification of cache side-channels. In: Madhusudan, P., Seshia, S.A. (eds.) CAV 2012. LNCS, vol. 7358, pp. 564\u2013580. Springer, Heidelberg (2012)"},{"key":"12_CR18","unstructured":"Krohn, M., Yip, A., Brodsky, M., Morris, R., Walfish, M.: A world wide web without walls. In: 6th ACM Workshop on Hot Topics in Networking (Hotnets), Atlanta, November 2007"},{"issue":"10","key":"12_CR19","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"BW Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613\u2013615 (1973)","journal-title":"Commun. ACM"},{"issue":"19","key":"12_CR20","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1016\/j.tcs.2010.01.025","volume":"411","author":"P Li","year":"2010","unstructured":"Li, P., Zdancewic, S.: Arrows for secure information flow. Theor. Comput. Sci. 411(19), 1974\u20131994 (2010)","journal-title":"Theor. Comput. Sci."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Marlow, S., Newton, R., Jones, S.L.P.: A monad for deterministic parallelism. In: Proceedings of the ACM SIGPLAN Symposium on Haskell (2011)","DOI":"10.1145\/2034675.2034685"},{"issue":"1","key":"12_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/0890-5401(91)90052-4","volume":"93","author":"E Moggi","year":"1991","unstructured":"Moggi, E.: Notions of computation and monads. Inf. Comput. 93(1), 55\u201392 (1991)","journal-title":"Inf. Comput."},{"key":"12_CR23","series-title":"LNCS","first-page":"1","volume-title":"CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"12_CR24","unstructured":"Pablo, B., Russo, A.: Lazy programs leak secrets. In: The Pre-proceedings of the 18th Nordic Conference on Secure IT Systems (NordSec), October 2013"},{"key":"12_CR25","unstructured":"Page, D.: Partitioned cache architecture as a side-channel defence mechanism. IACR Cryptology ePrint Archive 2005 (2005)"},{"key":"12_CR26","unstructured":"Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan 2005 (2005)"},{"key":"12_CR27","unstructured":"Pottier, F.: A simple view of type-secure information flow in the $$\\pi $$-calculus. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (2002)"},{"key":"12_CR28","unstructured":"Russo, A., Sabelfeld, A.: Securing interaction between threads and the scheduler. In: Proceedings of the IEEE Computer Security Foundations Workshop, July 2006"},{"key":"12_CR29","series-title":"LNCS","first-page":"474","volume-title":"PSI 2006","author":"A Russo","year":"2007","unstructured":"Russo, A., Sabelfeld, A.: Security for multithreaded programs under cooperative scheduling. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, vol. 4378, pp. 474\u2013480. Springer, Heidelberg (2007)"},{"key":"12_CR30","series-title":"LNCS","first-page":"120","volume-title":"ASIAN 2006","author":"A Russo","year":"2007","unstructured":"Russo, A., Hughes, J., Naumann, D.A., Sabelfeld, A.: Closing internal timing channels by transformation. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 120\u2013135. Springer, Heidelberg (2007)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Russo, A., Claessen, K., Hughes, J.: A library for light-weight information-flow security in Haskell. In: Proceedings of the ACM SIGPLAN Symposium on Haskell, pp. 13\u201324. ACM Press, September 2008","DOI":"10.1145\/1543134.1411289"},{"key":"12_CR32","unstructured":"Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proceedings of the IEEE Computer Security Foundations Workshop, July 2000"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proceedings of the ACM Symposium on Principles of Programming Languages, January 1998","DOI":"10.1145\/268946.268975"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Stefan, D., Russo, A., Mitchell, J.C., Mazi\u00e8res, D.: Flexible dynamic information flow control in Haskell. In: Haskell Symposium. ACM SIGPLAN, September 2011","DOI":"10.1145\/2034675.2034688"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Stefan, D., Russo, A., Buiras, P., Levy, A., Mitchell, J.C., Mazi\u00e8res, D.: Addressing covert termination and timing channels in concurrent information flow systems. In: The 17th ACM SIGPLAN International Conference on Functional Programming (ICFP), pp. 201\u2013213. ACM, September 2012","DOI":"10.1145\/2364527.2364557"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Stefan, D., Russo, A., Mitchell, J.C., Mazi\u00e8res, D.: Flexible dynamic information flow control in the presence of exceptions. Arxiv preprint arXiv:1207.1457 (2012)","DOI":"10.1145\/2034675.2034688"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Stefan, D., Buiras, P., Yang, E.Z., Levy, A., Terei, D., Russo, A., Mazi\u00e8res, D.: Eliminating cache-based timing attacks with instruction-based scheduling. In: Proceedings of the European Symposium on Research in Computer Security, pp. 718\u2013735 (2013)","DOI":"10.1007\/978-3-642-40203-6_40"},{"key":"12_CR38","unstructured":"Swierstra, W.: A Functional specification of effects. Ph.D. thesis, University of Nottingham, November 2008"},{"issue":"2\u20133","key":"12_CR39","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3233\/JCS-1999-72-305","volume":"7","author":"D Volpano","year":"1999","unstructured":"Volpano, D., Smith, G.: Probabilistic noninterference in a concurrent language. J. Comput. Secur. 7(2\u20133), 231\u2013253 (1999)","journal-title":"J. Comput. Secur."},{"issue":"3","key":"12_CR40","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1144396.1144401","volume":"11","author":"W.H. Wong","year":"2005","unstructured":"Wong, W.H.: Timing attacks on RSA: revealing your secrets through the fourth dimension. Crossroads 11(3), p. 5 (2005)","journal-title":"Crossroads"},{"key":"12_CR41","unstructured":"Zdancewic, S., Myers, A.C.: Observational determinism for concurrent program security. In: Proceedings of the IEEE Computer Security Foundations Workshop, June 2003"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, D., Askarov, A., Myers, A.C.: Language-based control and mitigation of timing channels. In: Proceedings of PLDI. ACM (2012)","DOI":"10.1145\/2254064.2254078"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05119-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:11:15Z","timestamp":1703203875000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05119-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319051185","9783319051192"],"references-count":42,"aliases":["10.1007\/978-3-319-14128-2_12"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05119-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}