{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T18:40:11Z","timestamp":1739040011817,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642010033"},{"type":"electronic","value":"9783642010040"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01004-0_14","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T15:03:02Z","timestamp":1238079782000},"page":"244-262","source":"Crossref","is-referenced-by-count":2,"title":["Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection"],"prefix":"10.1007","author":[{"given":"Jedidiah R.","family":"Crandall","sequence":"first","affiliation":[]},{"given":"John","family":"Brevik","sequence":"additional","affiliation":[]},{"given":"Shaozhi","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Gary","family":"Wassermann","sequence":"additional","affiliation":[]},{"given":"Daniela A. S.","family":"de Oliveira","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[]},{"given":"S. Felix","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Frederic T.","family":"Chong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"14_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","volume":"1","author":"D. Moore","year":"2003","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. IEEE Security and Privacy\u00a01(4), 33\u201339 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"14_CR2","first-page":"301","volume-title":"DSN 2006: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2006)","author":"S.R. Sarangi","year":"2006","unstructured":"Sarangi, S.R., Greskamp, B., Torrellas, J.: CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging. In: DSN 2006: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2006), Washington, DC, USA, pp. 301\u2013312. IEEE Computer Society, Los Alamitos (2006)"},{"key":"14_CR3","volume-title":"The Mathematical Theory of Communication","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press, Urbana (1949)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Wray, J.C.: An analysis of covert timing channels. In: IEEE Symposium on Security and Privacy, pp. 2\u20137 (1991)","DOI":"10.1109\/RISP.1991.130767"},{"key":"14_CR5","unstructured":"General William T. Sherman, as quoted in B. H. Liddell Hart, Strategy, second revised edition"},{"key":"14_CR6","volume-title":"Malicious Cryptography: Exposing Cryptovirology","author":"A. Young","year":"2004","unstructured":"Young, A., Yung, M.: Malicious Cryptography: Exposing Cryptovirology. Wiley Publishing, Inc., Chichester (2004)"},{"key":"14_CR7","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on SSH. In: USENIX Security Symposium 2001 (2001)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Kuhn, M.G.: Optical time-domain eavesdropping risks of CRT displays. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 3\u201318 (2002)","DOI":"10.1109\/SECPRI.2002.1004358"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote Physical Device Fingerprinting. In: IEEE Symposium on Security and Privacy (May 2005)","DOI":"10.1109\/SP.2005.18"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1145\/1273440.1250723","volume":"35","author":"Z. Wang","year":"2007","unstructured":"Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. SIGARCH Comput. Archit. News\u00a035(2), 494\u2013505 (2007)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"14_CR11","unstructured":"Yumerefendi, A., Mickle, B., Cox, L.P.: Tightlip: Keeping applications from spilling the beans. In: Networked Systems Design and Implementation (NSDI) (2007)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: IEEE Symposium on Security and Privacy, pp. 75\u201386 (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"de Oliveira, D.A.S., Crandall, J.R., Wassermann, G., Su, Z., Wu, S.F., Chong, F.T.: ExecRecorder: VM-based full-system replay for attack analysis and system recovery. In: Workshop on Architectural and System Support for Improving Software Dependability, San Jose, CA (October 2006)","DOI":"10.1145\/1181309.1181320"},{"key":"14_CR15","unstructured":"The OpenSSL Project, http:\/\/www.openssl.org\/"},{"key":"14_CR16","first-page":"31","volume-title":"CSFW 2005: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW 2005)","author":"M.R. Clarkson","year":"2005","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. In: CSFW 2005: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW 2005), Washington, DC, USA, pp. 31\u201345. IEEE Computer Society, Los Alamitos (2005)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Kang, M.H.: Covert channels - here to stay? In: Compass 1994: 9th Annual Conference on Computer Assurance, Gaithersburg, MD, National Institute of Standards and Technology, pp. 235\u2013244 (1994)","DOI":"10.1109\/CMPASS.1994.318449"},{"key":"14_CR18","first-page":"119","volume-title":"CCS 1993: Proceedings of the 1st ACM conference on Computer and Communications Security","author":"M.H. Kang","year":"1993","unstructured":"Kang, M.H., Moskowitz, I.S.: A pump for rapid, reliable, secure communication. In: CCS 1993: Proceedings of the 1st ACM conference on Computer and Communications Security, pp. 119\u2013129. ACM Press, New York (1993)"},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M. Costa","year":"1983","unstructured":"Costa, M.: Writing on dirty paper (corresp.). IEEE Transactions on Information Theory\u00a029(3), 439\u2013441 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., Vachharajani, M., August, D.I.: RIFLE: An architectural framework for user-centric information-flow security. In: Proceedings of the 37th International Symposium on Microarchitecture (MICRO) (December 2004)","DOI":"10.1109\/MICRO.2004.31"},{"key":"14_CR21","unstructured":"Fenton, J.S.: Information protection systems. Ph.D. Thesis, University of Cambridge (1973)"},{"issue":"2","key":"14_CR22","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1093\/comjnl\/17.2.143","volume":"17","author":"J.S. Fenton","year":"1974","unstructured":"Fenton, J.S.: Memoryless subsystems. The Computer Journal\u00a017(2), 143\u2013147 (1974)","journal-title":"The Computer Journal"},{"key":"14_CR23","volume-title":"Cryptography and Data Security","author":"D.E.R. Denning","year":"1982","unstructured":"Denning, D.E.R.: Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)"},{"key":"14_CR24","first-page":"344","volume-title":"Computer Security: Art and Science","author":"M. Bishop","year":"2003","unstructured":"Bishop, M.: Computer Security: Art and Science, p. 344. Addison-Wesley, Reading (2003)"},{"key":"14_CR25","volume-title":"IMC 2005: Proceedings of the 5th ACM SIGCOMM on Internet measurement","author":"A. Kumar","year":"2006","unstructured":"Kumar, A., Paxson, V., Weaver, N.: Exploiting underlying structure for detailed reconstruction of an internet-scale event. In: IMC 2005: Proceedings of the 5th ACM SIGCOMM on Internet measurement. ACM Press, New York (2006)"},{"issue":"SI","key":"14_CR26","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/844128.844148","volume":"36","author":"G.W. Dunlap","year":"2002","unstructured":"Dunlap, G.W., King, S.T., Cinar, S., Basrai, M.A., Chen, P.M.: ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev.\u00a036(SI), 211\u2013224 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Wittbold, J.T., Johnson, D.M.: Information flow in nondeterministic systems. In: IEEE Symposium on Security and Privacy, pp. 144\u2013161 (1990)","DOI":"10.1109\/RISP.1990.63846"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Gray III, J.W.: Toward a mathematical foundation for information flow security. In: IEEE Symposium on Security and Privacy, pp. 21\u201335 (1991)","DOI":"10.1109\/RISP.1991.130769"},{"key":"14_CR29","first-page":"307","volume-title":"CCS 2007: Proceedings of the 14th ACM conference on Computer and Communications Security","author":"S. Gianvecchio","year":"2007","unstructured":"Gianvecchio, S., Wang, H.: Detecting covert timing channels: an entropy-based approach. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and Communications Security, pp. 307\u2013316. ACM, New York (2007)"},{"key":"14_CR30","first-page":"286","volume-title":"CCS 2007: Proceedings of the 14th ACM conference on Computer and Communications Security","author":"B. K\u00f6pf","year":"2007","unstructured":"K\u00f6pf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and Communications Security, pp. 286\u2013296. ACM, New York (2007)"},{"key":"14_CR31","first-page":"270","volume-title":"CCS 1994: Proceedings of the 2nd ACM Conference on Computer and Communications Security","author":"R. Browne","year":"1994","unstructured":"Browne, R.: An entropy conservation law for testing the completeness of covert channel analysis. In: CCS 1994: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 270\u2013281. ACM Press, New York (1994)"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Browne, R.: The turing test and non-information flow. In: IEEE Symposium on Security and Privacy, pp. 373\u2013388 (1991)","DOI":"10.1109\/RISP.1991.130804"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Browne, R.: Mode security: An infrastructure for covert channel suppression. In: IEEE Symposium on Security and Privacy, pp. 39\u201355 (1999)","DOI":"10.1109\/RISP.1994.296593"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1) (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"14_CR35","volume-title":"POPL 1999: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"A.C. Myers","year":"1999","unstructured":"Myers, A.C.: JFlow: Practical mostly-static information flow control. In: POPL 1999: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM Press, New York (1999)"},{"key":"14_CR36","volume-title":"POPL 2007: Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"P. Malacaria","year":"2007","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: POPL 2007: Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM Press, New York (2007)"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"McCamant, S., Ernst, M.D.: A simulation-based proof technique for dynamic information flow. In: PLAS 2007: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, San Diego, California, USA, June\u00a014 (2007)","DOI":"10.1145\/1255329.1255336"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. In: Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, Tucson, AZ, USA, June\u00a09\u201311 (2008)","DOI":"10.1145\/1375581.1375606"},{"key":"14_CR39","unstructured":"Light Pink Book: A guide to understanding covert channel analysis of trusted systems, version 1. NCSC-TG-030, Library No. S-240,572, TCSEC Rainbow Series Library (November 1993)"},{"issue":"10","key":"14_CR40","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Communications of the ACM\u00a016(10), 613\u2013615 (1973)","journal-title":"Communications of the ACM"},{"key":"14_CR41","first-page":"192","volume-title":"SOSP 1975: Proceedings of the fifth ACM Symposium on Operating Systems Principles","author":"S.B. Lipner","year":"1975","unstructured":"Lipner, S.B.: A comment on the confinement problem. In: SOSP 1975: Proceedings of the fifth ACM Symposium on Operating Systems Principles, pp. 192\u2013196. ACM Press, New York (1975)"},{"key":"14_CR42","unstructured":"McHugh, J.: Covert channel analysis (1995)"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Millen, J.K.: 20 years of covert channel modeling and analysis. In: IEEE Symposium on Security and Privacy, pp. 113\u2013114 (1999)","DOI":"10.1109\/SECPRI.1999.766906"},{"issue":"3","key":"14_CR44","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/357369.357374","volume":"1","author":"R.A. Kemmerer","year":"1983","unstructured":"Kemmerer, R.A.: Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans. Comput. Syst.\u00a01(3), 256\u2013277 (1983)","journal-title":"ACM Trans. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01004-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T18:03:25Z","timestamp":1739037805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01004-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642010033","9783642010040"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01004-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}