6 papers:
- ICSE-v2-2015-SadeghiBM #analysis #android #security #using
- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
- OSDI-2014-ChenMXHPSZ #detection
- Detecting Covert Timing Channels with Time-Deterministic Replay (AC, WBM, HX, AH, LTXP, MS, WZ), pp. 541–554.
- ICFP-2012-StefanRBLMM #concurrent #data flow #termination
- Addressing covert termination and timing channels in concurrent information flow systems (DS, AR, PB, AL, JCM, DM), pp. 201–214.
- STOC-2010-GoyalJ #complexity #on the
- On the round complexity of covert computation (VG, AJ), pp. 191–200.
- SAC-2010-OkamuraO #virtual machine
- Load-based covert channels between Xen virtual machines (KO, YO), pp. 173–180.
- STOC-2005-AhnHL
- Covert two-party computation (LvA, NJH, JL), pp. 513–522.