Optimization of covert channel identification

被引:0
作者
Shen, Jianjun [1 ]
Qing, Sihan [1 ]
Shen, Qingni [1 ]
Li, Liping [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, Beijing ZhongkeAnsheng Corp Informat Technol, Inst Software, Beijing 100864, Peoples R China
来源
THIRD INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS | 2006年
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We characterize the properties of covert channels and present a taxonomy of covert channels. Information flow sequence is adopted to represent information flows and covert channels. Covert channels are categorized according to their information flow characteristics. On this basis, we explore the optimization of convert channel identification with the Shared Resource Matrix method adopted for demonstration. A general framework for covert channel identification founded on information flow analysis is proposed. We also review previous work within our framework. The application of our approach to a practical system is shown. At last, a new class of covert channels which used to be omitted by previous work is introduced.
引用
收藏
页码:95 / +
页数:2
相关论文
共 21 条
  • [1] Andrassy I., 1956, Archivum Zoologicum Budapest, V2, P1
  • [2] [Anonymous], GUID UND COV CHANN A
  • [3] [Anonymous], COMMON CRITERIA INFO
  • [4] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
  • [5] Eckmann S. T., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P30, DOI 10.1109/RISP.1994.296594
  • [6] Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
  • [7] Goguen J. A., 1984, Proceedings of the 1984 Symposium on Security and Privacy, P75
  • [8] AN EXPERIENCE USING 2 COVERT CHANNEL ANALYSIS TECHNIQUES ON A REAL SYSTEM-DESIGN
    HAIGH, JT
    KEMMERER, RA
    MCHUGH, J
    YOUNG, WD
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 157 - 168
  • [9] He J., 1990, Proceedings. The Computer Security Foundations Workshop III (Cat. No.TH0315-2), P139, DOI 10.1109/CSFW.1990.128194
  • [10] HE J, 1992, P 2 EUR S RES COMP S, P57