TY - GEN
T1 - Predictive mitigation of timing channels in interactive systems
AU - Zhang, Danfeng
AU - Askarov, Aslan
AU - Myers, Andrew C.
PY - 2011
Y1 - 2011
N2 - Timing channels remain a difficult and important problem for information security. Recent work introduced predictive mitigation, a new way to mitigating leakage through timing channels; this mechanism works by predicting timing from past behavior, and then enforcing the predictions. This paper generalizes predictive mitigation to a larger and important class of systems: systems that receive input requests from multiple clients and deliver responses. The new insight is that timing predictions may be a function of any public information, rather than being a function simply of output events. Based on this insight, a more general mechanism and theory of predictive mitigation becomes possible. The result is that bounds on timing leakage can be tightened, achieving asymptotically logarithmic leakage under reasonable assumptions. By applying it to web applications, the generalized predictive mitigation mechanism is shown to be effective in practice.
AB - Timing channels remain a difficult and important problem for information security. Recent work introduced predictive mitigation, a new way to mitigating leakage through timing channels; this mechanism works by predicting timing from past behavior, and then enforcing the predictions. This paper generalizes predictive mitigation to a larger and important class of systems: systems that receive input requests from multiple clients and deliver responses. The new insight is that timing predictions may be a function of any public information, rather than being a function simply of output events. Based on this insight, a more general mechanism and theory of predictive mitigation becomes possible. The result is that bounds on timing leakage can be tightened, achieving asymptotically logarithmic leakage under reasonable assumptions. By applying it to web applications, the generalized predictive mitigation mechanism is shown to be effective in practice.
UR - http://www.scopus.com/inward/record.url?scp=80755187785&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80755187785&partnerID=8YFLogxK
U2 - 10.1145/2046707.2046772
DO - 10.1145/2046707.2046772
M3 - Conference contribution
AN - SCOPUS:80755187785
SN - 9781450310758
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 563
EP - 574
BT - CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security
T2 - 18th ACM Conference on Computer and Communications Security, CCS'11
Y2 - 17 October 2011 through 21 October 2011
ER -