A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later

  • Authors:
  • Richard A. Kemmerer

  • Affiliations:
  • -

  • Venue:
  • ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Secure computer systems use both mandatory and discretionaryaccess controls to restrict the flow of informationthrough legitimate communication channels such as files,shared memory and process signals. Unfortunately, in practiceone finds that computer systems are built such that usersare not limited to communicating only through the intendedcommunication channels. As a result, a well-founded concernof security-conscious system designers is the potentialexploitation of system storage locations and timing facilitiesto provide unforeseen communication channels to users.These illegitimate channels are known as covert storage andtiming channels.Prior to the presentation of this paper twenty years agothe covert channel analysis that took place was mostly adhoc. Methods for discovering and dealing with these channelswere mostly informal, and the formal methods were restrictedto a particular specification language. This paperpresents a methodology for discovering storage and timingchannels that can be used through all phases of the softwarelife cycle to increase confidence that all channels have beenidentified. In the original paper the methodology was presentedand applied to an example system having three differentdescriptions: English, formal specification, and high-orderlanguage implementation. In this paper only the Englishrequirements are considered. However, the paper alsopresents how the methodology has evolved and the influenceit had on other work.