Modelling a Fuzzy Time System

  • Authors:
  • Jonathan T. Trostle

  • Affiliations:
  • -

  • Venue:
  • SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
  • Year:
  • 1993

Quantified Score

Hi-index 0.00

Visualization

Abstract

We analyze the DEC fuzzy time technique (Hu [2])for both a single computer system and a network ofhosts. Specifically, we investigate covert channels in amodel of a fuzzy time system and in a network modelof n fuzz y time hosts and one nonfuzzy time host. Thefuzzy time operating system model predicts a covertchannel with a datarate of roughly 50 bits per second,given a mean time between upticks of 20 millisecondsas in the VAX security kernel. We suggest several countermeasures including scheduler redesign which will close or reduce the channels that we analyze.