BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
time (3)
channel (3)
comput (2)
round (1)
android (1)

Stem covert$ (all stems)

6 papers:

ICSEICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
OSDIOSDI-2014-ChenMXHPSZ #detection
Detecting Covert Timing Channels with Time-Deterministic Replay (AC, WBM, HX, AH, LTXP, MS, WZ), pp. 541–554.
ICFPICFP-2012-StefanRBLMM #concurrent #data flow #termination
Addressing covert termination and timing channels in concurrent information flow systems (DS, AR, PB, AL, JCM, DM), pp. 201–214.
STOCSTOC-2010-GoyalJ #complexity #on the
On the round complexity of covert computation (VG, AJ), pp. 191–200.
SACSAC-2010-OkamuraO #virtual machine
Load-based covert channels between Xen virtual machines (KO, YO), pp. 173–180.
Covert two-party computation (LvA, NJH, JL), pp. 513–522.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.