期刊文献+

隐通道传递信息机理的研究

On the Principle of Information Transfer in Covert Channel
下载PDF
导出
摘要 可信计算机系统中一些隐蔽数据流避开了安全机制的监控,造成信息的泄漏。本文通过对这种隐蔽流泄漏信息的机理进行分析和抽象,提出了一个通道元模型。将每一类通道元看成一个有限状态机,以Plotkin的结构化操作语义等为基础,计算出状态机的状态变化序列。通过对不满足隐通道定义的状态变迁序列的归纳,得到了抽象机中安全状态转移的约束条件,找出两个通道元通过共享客体泄露信息的工作机理,从而开发出一种基于操作语义的隐通道标识方法。对电梯调度算法模型进行实验,可有效地标识出存在的隐通道。 Some covert information flow evades the inspection of security mechanism in trusted computer system, which results in information leakage. The atomic channel model was established by analyzing and abstracting the principle of covert information flow. A finite state machine was used to describe an atomic channel model. Based on the structured operational semantics proposed by Plotkin we can compute sequences of states. By reasoning on state sequences against the definition of covert channel, restriction conditions of secure state translation were gained, and the principle of information leakage in two atomic channel models sharing an object was found. Consequently a covert channel identification method based on operational semantics was proposed. The experiment on elevator dispatch algorithm showed that our method could search for covert channels efficiently.
出处 《计算机科学》 CSCD 北大核心 2007年第10期92-95,142,共5页 Computer Science
基金 本课题受到国家自然科学基金(编号:60573046)的资助。
关键词 隐通道 信息安全 安全模型 Covert channel, Information security, Security model
  • 相关文献

参考文献21

  • 1McHugh J. Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems [R]. Portland State University, December 1995
  • 2Denning D E, Denning P J. Certification of Programs for Secure Information Flow. Communications of the ACM[J], 1977, 20 (7): 504-513
  • 3Bell D E, LaPadula L J. Secure computer system: Unified exposition and MULTICS interpretation: [TechRep MTR-2997]. The MITRE Corporation, 1976
  • 4McHngh J. An information flow tool for Gypsy. In: Computer Security Applications Conference[C]. ACSAC 2001. Proceedings 17th Annual Dec .2001.191-201
  • 5Goguen j A, Meseguer J. Security Policies and Security Models. In: Proceedings of the IEEE Symposium on Security and Privacy [C], Oacldand, California, 1982. 11-20
  • 6Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans on Computer Systems[J].1983. 256-277
  • 7Kemmerer R A. Covert Flow Trees: A Visual Approach to Analyzing Covert torage Channels. IEEE Transactions on Software Engineering[J].1991: 17(11): 1166-1185
  • 8Venkatraman B R, Newman-Wolfe R E. Capacity Estimation and Auditability of Network Covert Channels. In: Security and Privaey, IEEE Symposium[C].May 1995. 186-198
  • 9Wang C D, Ju Shiguang- Research on the methods of search and elimination in covert channel. In:Grid and Cooperative Computing [C], LNCS, PT 1 3032:1 2004. 988-99
  • 10Goldschlag D M. Several Secure Store and Forward Devices. In: Proc. of the Third ACM Conference on Computer and Communications Secunrity[C], New Delhi, India, March 1996. 129-137

二级参考文献29

  • 1冯玉琳,计算机学报,1992年,15卷,12期
  • 2冯玉琳,Theories of concurrency,1990年
  • 3Kemmerer RA, Taylor TA. Modular covert channel analysis methodology for trusted DG/UXTM. IEEE Trans. on Software Engineering, Vol. 22, 1996.
  • 4Denning DE. A lattice model of secure information flow. Communications of the ACM, 1976. 236-243.
  • 5He J, Gligor VD. Information flow analysis for covert-channel identification in multilevel secure operating systems. In: Proc. of the 3rd IEEE Workshop on Computer Security Foundations. 1990. 139-148.
  • 6Feiertag R. A technique for proving specifications are multilevel secure. Technical Report CSL-109, 1980.
  • 7Feiertag R, Levitt KN, Robinson L. Proving multilevel security of a system design. In: Proc. of the 6th ACM Symp. on Operating Systems Principles. 1977.57-65.
  • 8Goguen JA, Meseguer J. Security policies and security models. In: Proc. of the IEEE Symp. on Security and Privacy. 1982. 11-20.
  • 9Millen JK. Foundations of covert-channel detection. Technical Report MTR-10538, The M1TRE Corporation, 1989.
  • 10Goguen JA, Meseguer J. Unwinding and inference vontrol. In: Proc. of the IEEE Symp. on Security and Privacy. 1984. 75-86.

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部