Scenarios and Covert Channels: Another Game...

  • Authors:
  • Loïc Hélouët;Marc Zeitoun;Aldric Degorre

  • Affiliations:
  • IRISA/INRIA, Campus de Beaulieu, 35042 Rennes Cedex, France;LIAFA, Case 7014, 2 place Jussieu 75251 Paris Cedex 05, France;ENS Cachan, Antenne de Bretagne, Campus de Ker Lann, av. R. Schuman, 35 170 Bruz, France

  • Venue:
  • Electronic Notes in Theoretical Computer Science (ENTCS)
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Covert channels are information leaks in systems that use resources to transfer secretly a message. They are a threat for security, performance, but also for a system's profitability. This paper proposes a new approach to detect covert channels from scenario models of protocols. The problem of finding covert channels in scenarios is first modeled as a game, in which a pair of malicious users {S,R} is trying to transfer information while the rest of the protocol tries to prevent it. The messages transferred are encoded by behavioral choices at some precise moments, and decoded by a transducer whose input vocabulary is an observation of the system. We then characterize the presence of a covert channel as the existence of a winning strategy for {S,R} and of a decoder.