Abstract
A quick overview of what I’m going to go through: the background of timing attacks; current means that have been used to overcome the attacks; why we’re going to use ATM networks to overcome them; what changes we think ought to be put into the ATM structure; how this would provide some means of detecting and hopefully overcoming denial of service attacks as well; and then some conclusions at the end.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Price, G. (2002). Thwarting Timing Attacks Using ATM Networks. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2001. Lecture Notes in Computer Science, vol 2467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45807-7_8
Download citation
DOI: https://doi.org/10.1007/3-540-45807-7_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44263-9
Online ISBN: 978-3-540-45807-4
eBook Packages: Springer Book Archive