期刊文献+

隐蔽通道信息流的研究

Covert Channel Research Based on Information Flow
原文传递
导出
摘要 本文在分析以往信息流理论的基础上,采用了一种和操作系统源代码编写相同的思路,完全按照系统设计时的结构化思路分析隐蔽通道。和以往的信息流分析理论相比,该方法能充分利用软件自身的结构化特征,使得信息流分析可以借鉴源代码开发的思路,大大的降低了隐蔽通道分析的难度,增加了源代码分析的可行性。 A new method for detecting covert storage channel using source code is proposed after analyzing the current technology.The method uses same train of thought as encoding.It makes full use of structural characteristics of the software, reduces the degree of difficulty and increases the feasibility greatly.
出处 《网络安全技术与应用》 2010年第2期62-67,共6页 Network Security Technology & Application
关键词 信息安全 安全操作系统 隐蔽通道 信息流 information security secure operating system covert channel info-flow
  • 相关文献

参考文献3

二级参考文献28

  • 1McHUGH J. Handbook for the computer security certification of trusted systems:covert channel analysis[R]. [S.l.]:Naval Research Laboratory, 1996.
  • 2DENNING D E. A lattice model of secure information-flow[ J]. Communications of the ACM, 1976,19 ( 5 ) :236-243.
  • 3HE Jing-sha, GLIGOR V D. Information-flow analysis for covert-channel identification in multilevel secure operating systems [ C ]//Proc of Computer Security Foundations Workshop. 1990 : 139-148.
  • 4SHEN Jian-jun, QING Si-han,SHEN Qing-ni. Covert channel identification founded on information flow analysis [ C]//Lecture Notes in Computer Science, vol 3802. 2005:381-387.
  • 5TSAI C, GLIGORL V, SEKAR C. On the identification of covert storage channels in secure systems [ J]. IEEE Trans on Software Engineering, 1990,16 (6) :569-580.
  • 6OTTENSTEIN K, WARREN J. The program dependence and its use in optimization [ J ]. ACM Trans on Programming Languages and Systems, 1987,9 ( 3 ) :319-349.
  • 7LENGAURE T,TARJAN R. A fast algorithm for finding dominators in a flow graph [ J]. ACM Yrans on Programming Languages and Systems, 1979,1 ( 1 ) : 121-141.
  • 8[1]Lampson BW. A note on the confinement problem. CACM, 1973,16(10):.613~615.
  • 9[2]Tsai CR, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code. IEEE Trans. on Software Engineering, 1990,16(6):569~580.
  • 10[3]U.S. Department of Defense. Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, 1985.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部