Finding covert channels in protocols with message sequence charts: the case of RMTP2

  • Authors:
  • Loic Hélouët

  • Affiliations:
  • IRISA, Rennes, France

  • Venue:
  • SAM'04 Proceedings of the 4th international SDL and MSC conference on System Analysis and Modeling
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Covert channels are illegal information flows in systems. Recent research has shown how to detect covert channels in scenario descriptions. This paper recalls these results, and proposes a case study illustrating how scenarios can be used to detect illegal information flows from a scenario description of a protocol. Once a covert information flow is discovered, its bandwidth is computed using the (max, +) algebra.