Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
IEEE Transactions on Software Engineering
Shared resource matrix methodology: an approach to identifying storage and timing channels
ACM Transactions on Computer Systems (TOCS)
A lattice model of secure information flow
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Covert-channel analysis in secure computer systems
Covert-channel analysis in secure computer systems
Information flow graph: an approach to identifying covert storage channels
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hi-index | 0.00 |
This paper focuses on covert channel identification in a nondiscretionary secure system. The properties of covert channels are analyzed by channel types. Information flow characteristics are utilized to optimize channel identification with the Share Resource Matrix method adopted for demonstration, and a general framework for channel identification founded on information flow analysis is presented. At last, timing channels are also discussed.