期刊文献+

隐通道存在的最小条件及其应用 被引量:5

The Minimum Criteria of Covert Channels' Existence and its Application
下载PDF
导出
摘要 隐通道能在安全机制的监控之下将保密信息外泄,因而对系统安全的威胁极大。通过研究隐通道的工作原理,形式化地证明了隐通道存在的最小条件。在此基础上,对现有的隐通道搜索与消除方法进行了分类,并从理论上说明了各种方法的正确性及其不足。这些工作不仅为隐通道的搜索与消除工作提供了可信的理论依据,而且为寻找新的隐通道搜索与消除方法提供了一个研究框架。 Covert channels can leak confidential information under the supervision of security mechanism,so its threat is very serious. By research on the working principle of covert channels,the minimum criteria of its existence had been formally proved. Based on it,the taxonomy for the methods of search and elimination in covert channels was given. Furthermore,each method's correctness and deficiency were represented theoretically. These were not only offered the theory bedrock for the work of search and eliminate covert channels,but also given a frame for develop new search and elimination methods in covert channels.
出处 《计算机科学》 CSCD 北大核心 2005年第1期77-79,共3页 Computer Science
基金 国家自然科学基金(No.60373069) 江苏省自然科学基金(No.BK200204)
关键词 隐通道 安全模型 安全策略 最小条件 搜索方法 消除方法 Covert channel Security model Security policy
  • 相关文献

参考文献18

  • 1Lampson B W. A note on the confinement problem. CACM,1973,16(10):613~615
  • 2McHugh J. Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems,Portland State University,Dec. 1995
  • 3Scheafer M,Gold B,Linde R, Scheid J. Program Confinement in KVM/370. In:Proc. of the 1977 ACM Annual Conference,Seattel,WA,USA, Oct. 1977. 404~401
  • 4Karger P A,Wray J C. Storage Channels in Disk Arm Optimization,IEEE 1991
  • 5He Jingsha, Gligor V D. Information-Flow Analysis for CovertChannel Identification in Multilevel Secure Operating Systems,IEEE 1990
  • 6Kemmerer R A. Shared resource matrix methodology:A practical approach to indetifying covert channels. ACM Transactions on Computer Systems, 1983,1 (3) :256~277
  • 7Kemmerer R A. Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Transactions on Software Engineering, 1991,17 ( 11 )
  • 8TSAI Chii-Ren,et al. On the identification of covert storage channels in secure systems. IEEE Transactions on Software Engineering,1990,16(6): 569~580
  • 9Tsai C R,Gligor V D,Chandersekaran C S. A formal method for the identification of covert storage channels in source code. In:1987 IEEE Symposium on Security and Privacy, Oakland, CA,IEEE Computer Society,Computer Society Press, April 1987. 74~86
  • 10Ogurtsov N,Orman H,Schroeppel R,et al. Experimental Results of Covert Channel Limitation in One-Way Communication Systems,IEEE 1997

同被引文献36

  • 1冯玉琳,李京,黄涛.对象语义理论和行为约束推理[J].计算机学报,1993,16(11):823-838. 被引量:12
  • 2庄泗华,王剑,张福新.检测Linux下的VFS型内核后门软件[J].计算机应用研究,2005,22(5):194-196. 被引量:2
  • 3鞠时光,宋香梅.用于信息流分析的信息流树结构[J].江苏大学学报(自然科学版),2005,26(5):433-436. 被引量:4
  • 4陈渝,及兰盛,吴涛,邓朝晖.关于时间隐通道问题分析[J].计算机与现代化,1996(1):12-17. 被引量:1
  • 5夏耐,林志强,茅兵,谢立.隐蔽通道发现技术综述[J].计算机科学,2006,33(12):1-5. 被引量:5
  • 6National Computer Security Center.Department ofdefense trusted computer system evaluation criteria[S].DoD 5200.28-STD,1985-12.
  • 7Wang Changda,Ju Shiguang.Searching covert channels by identifying malicious subjects in the time domain[C].Proceedings from the Fiful Annual IEEE SMC Information Assurance Workshop,2004:68-73.
  • 8Nagatou Naoyuki.Watanabe Takuo.Run-time detection of covert channels[C].First International Conference on Availability,Reliability and Security,2006:577-584.
  • 9Chii-ten Tsai.Virgil D Gilgor,Sekar Chankersekaran C.On the identification of covert storage channels in secure systems[J].IEEE Transactions on Software Engineering,1990,16(6):569-580.
  • 10Kolter Jeremy Z,Maloof Marcus A.Leaming to detect and classify malicious executables in the wild [C].Seattle,WA,USA: 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2004:2721-2744.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部