By the same authors

Breaking the Model: finalisation and a taxonomy of security attack

Research output: Book/ReportOther report

Full text download(s)



Publication details

DatePublished - 2004
Number of pages20
PublisherDepartment of Computer Science, University of York
Original languageEnglish

Publication series

NameYork Computer Science Technical Report
PublisherDepartment of Computer Science, University of York


It is well known that security properties are not preserved by refinement, and that refinement can introduce new, covert, channels, such as timing channels. The finalisation step in refinement can be analysed to identify some of these channels, as unwanted finalisations that can break the assumptions of the formal model. We introduce a taxonomy of such unwanted finalisations, and give examples of attacks that exploit them.

Bibliographical note

Freely available.

    Research areas

  • Finalisation, Observed system, Security model assumptions

Discover related content

Find related publications, people, projects, datasets and more using interactive charts.

View graph of relations