Title:
Analysis of the execution time of a program and the leakage of sensitive information
Analysis of the execution time of a program and the leakage of sensitive information
Authors
Patel, Ami
Authors
Advisors
Harris, Bill
Advisors
Associated Organizations
Organizational Unit
Organizational Unit
Organizational Unit
Series
Collections
Supplementary to
Permanent Link
Abstract
In the information security field of computer science, the questions of whether a program is safe or unsafe depends heavily on the inputs in which the program may leak sensitive information to an attacker who can observe the execution time of the program. Existing information- flow analyses achieve precision or scalability, but not both. Moreover, many of the current techniques to determine the safety of a program are slow and inefficient or require to much man power. Because of this, the inputs of programs and possible automatic research methods are being researched to fill the gap in determining whether a program is safe or unsafe.
Sponsor
Date Issued
2017-05
Extent
Resource Type
Text
Resource Subtype
Undergraduate Thesis