Modeling concurrency with partial orders
International Journal of Parallel Programming
Tutorial on message sequence charts
Computer Networks and ISDN Systems - Special issue on SDL and MSC
An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Shared resource matrix methodology: an approach to identifying storage and timing channels
ACM Transactions on Computer Systems (TOCS)
A note on the confinement problem
Communications of the ACM
Theory of Codes
Infinite-State High-Level MSCs: Model-Checking and Realizability
ICALP '02 Proceedings of the 29th International Colloquium on Automata, Languages and Programming
Syntactic Detection of Process Divergence and Non-local Choice inMessage Sequence Charts
TACAS '97 Proceedings of the Third International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Sur les relations rationnelles
Proceedings of the 2nd GI Conference on Automata Theory and Formal Languages
Eliminating Covert Flows with Minimum Typings
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Non-Interference: Who Needs It?
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
LSCs: Breathing Life into Message Sequence Charts
LSCs: Breathing Life into Message Sequence Charts
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Hiding information in multi level security systems
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Hi-index | 0.00 |
Covert channels are information leaks in systems that use resources to transfer secretly a message. They are a threat for security, performance, but also for a system's profitability. This paper proposes a new approach to detect covert channels from scenario models of protocols. The problem of finding covert channels in scenarios is first modeled as a game, in which a pair of malicious users {S,R} is trying to transfer information while the rest of the protocol tries to prevent it. The messages transferred are encoded by behavioral choices at some precise moments, and decoded by a transducer whose input vocabulary is an observation of the system. We then characterize the presence of a covert channel as the existence of a winning strategy for {S,R} and of a decoder.