Skip to main content

Noninterference and covert channel analysis

  • Security can be compromised by users sharing systems with parties who are not supposed to be able to get any information about them.
  • Highly relevant to Cloud.
  • At the leading edge of formulating and automating methods for discovering unwelcome information flows, including, for the first time, timing channels.

People

Michael Goldsmith
Senior Research Fellow, Associate Professor
Joel Ouaknine
Visiting Professor
Bill Roscoe
Emeritus Professor

Share this: