Analysis of the execution time of a program and the leakage of sensitive information

Author(s)
Patel, Ami
Advisor(s)
Harris, Bill
Editor(s)
Associated Organization(s)
Organizational Unit
Organizational Unit
School of Computer Science
School established in 2007
Supplementary to:
Abstract
In the information security field of computer science, the questions of whether a program is safe or unsafe depends heavily on the inputs in which the program may leak sensitive information to an attacker who can observe the execution time of the program. Existing information- flow analyses achieve precision or scalability, but not both. Moreover, many of the current techniques to determine the safety of a program are slow and inefficient or require to much man power. Because of this, the inputs of programs and possible automatic research methods are being researched to fill the gap in determining whether a program is safe or unsafe.
Sponsor
Date
2017-05
Extent
Resource Type
Text
Resource Subtype
Undergraduate Thesis
Rights Statement
Rights URI