<--- Back to Details
First PageDocument Content
Functional programming / Programming idioms / Inter-process communication / Software design patterns / Parallel computing / Monad / Concurrent Haskell / Information flow / Covert channel / Concurrent computing / LIO / Recursion
Date: 2012-10-19 15:09:55
Functional programming
Programming idioms
Inter-process communication
Software design patterns
Parallel computing
Monad
Concurrent Haskell
Information flow
Covert channel
Concurrent computing
LIO
Recursion

Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

Add to Reading List

Source URL: amitlevy.com

Download Document from Source Website

File Size: 322,35 KB

Share Document on Facebook

Similar Documents

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

DocID: 1uota - View Document

20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

DocID: 1u9SC - View Document

How to cook a covert channel Techniques Simon Castro and Gray World Team  Difficulty

How to cook a covert channel Techniques Simon Castro and Gray World Team Difficulty

DocID: 1u2Yd - View Document

Sixth Annual Conference on Privacy, Security and Trust  A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

DocID: 1sdoX - View Document

Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1rdk7 - View Document