An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
A note on the confinement problem
Communications of the ACM
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Integrating Security and Real-Time Requirements Using Covert Channel Capacity
IEEE Transactions on Knowledge and Data Engineering
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Proceedings of the First International Workshop on Information Hiding
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Eliminating Covert Flows with Minimum Typings
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Partial Model Checking and Theorem Proving for Ensuring Security Properties
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An Analysis of the Timed Z-channel
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A general theory of security properties
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Synthesis of distributed systems from knowledge-based specifications
CONCUR 2005 - Concurrency Theory
Scenarios and Covert Channels: Another Game...
Electronic Notes in Theoretical Computer Science (ENTCS)
Covert channels for collusion in online computer games
IH'04 Proceedings of the 6th international conference on Information Hiding
New constructive approach to covert channel modeling and channel capacity estimation
ISC'05 Proceedings of the 8th international conference on Information Security
The history of subliminal channels
IEEE Journal on Selected Areas in Communications
Results concerning the bandwidth of subliminal channels
IEEE Journal on Selected Areas in Communications
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Real-time information flow analysis
IEEE Journal on Selected Areas in Communications
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Formal Aspects in Security and Trust
The complexity of synchronous notions of information flow security
FOSSACS'10 Proceedings of the 13th international conference on Foundations of Software Science and Computational Structures
Hi-index | 0.00 |
In this paper we analyze the possibility for malicious agents to transmit an information possibly hidden in a Multi Level Security System via a covert channel. We give a framework for which we get two decidability results. Firstly, given a code and a system one can decide whether the system allows a covert channel for this code. Secondly, one can decide whether there exists a code to transmit one bit of information, the code is computable as well as the strategies of the two partners.