期刊文献+

隐蔽流树方法的分析与改进

Analysis and Improvement of Covert Flow Tree Method
下载PDF
导出
摘要 利用隐蔽流树方法搜索隐蔽通道时,获得的操作序列中只有极少部分真正构成隐蔽通道,增加了后续手工分析的工作量。为此,提出一种改进的隐蔽流树方法。根据信息流图进行建树,设计信息流规则,并给出隐蔽流树的自动分析算法。以一个文件系统为例进行分析,结果验证了改进方法的正确性。 When using Covert Flow Tree(CFT) method to search covert channel, only few operation sequences really constitute covert channel. It increases the subsequent manual analysis work. In order to solve this problem, this paper proposes an improved Covert Flow Tree(CFT) method. It uses the information flow graph to constitute trees, designs the statement information flow rule, and gives the tree traversal algorithm for automated analysis. It uses the pedagogical file system as analyzing example, and result shows the accuracy Of the improved method.
出处 《计算机工程》 CAS CSCD 2012年第8期114-116,共3页 Computer Engineering
关键词 隐蔽流树 隐蔽通道 信息流图 信息流规则 共享资源矩阵 Covert Flow Tree(CFT) covert channel information flow graph information flow rule Shared Resource Matrix(SRM)DOI: 10.3969/j.issn. 1000-3428.2012.08.037
  • 引文网络
  • 相关文献

参考文献8

  • 1曾璎珞,潘雪增,陈健.基于系统可信度的动态安全访问控制模型[J].计算机工程,2010,36(10):155-157. 被引量:2
  • 2Lampson B W.A Note on the Confinement Problem[J].Communi-cations of the ACM,1973,16(10):613-615. 被引量:1
  • 3Kemmerer R A.A Practical Approach to Identifying Storage and Timing Channels:Twenty Years Later[C]//Proc.of 2002 Computer Security Applications Conference.Las Vegas,USA:IEEE Computer Society,2002. 被引量:1
  • 4Haigh J T,Kemmerer R A,McHugh J,et al.An Experience Using Two Covert Channel Analysis Techniques on A Real System[J].IEEE Transactions on Software Engineering,1987,13(9):157-168. 被引量:1
  • 5Tsai C R,Gligor V D,Chandersekaran C S.A Formal Method for the Identification of Covert Storage Channels in Source Code[J].IEEE Trans.on Security and Privacy,1990,16(6):569-580. 被引量:1
  • 6Kemmerer R A.Covert Flow Trees:A Visual Approach to Analyzing Covert Storage Channels[J].IEEE Transactions on Software Engineering,1991,17(11):1166-1185. 被引量:1
  • 7鞠时光,宋香梅.用于信息流分析的信息流树结构[J].江苏大学学报(自然科学版),2005,26(5):433-436. 被引量:4
  • 8崔宾阁,刘大昕.基于信息流图的隐通道分析技术研究[J].哈尔滨工程大学学报,2006,27(5):742-747. 被引量:2

二级参考文献21

  • 1卿斯汉,朱继锋.安胜安全操作系统的隐蔽通道分析[J].软件学报,2004,15(9):1385-1392. 被引量:19
  • 2卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:32
  • 3毛韡锋,平玲娣,姜励,陈小平.安全操作系统的设计[J].计算机工程,2006,32(12):179-181. 被引量:3
  • 4黄启真.Linux启动运行后可信计算的设计和实现[D].杭州:浙江大学,2008. 被引量:2
  • 5Trusted Computing Group.Specification Architecture Overview (Specification V1.2)[EB/OL].(2006-03-29).http://www.trustedcom putinggroup.org/resources. 被引量:1
  • 6Brown A,Seltzer M.Operating System Benchmarking in the Wake of Lmbench:A Case Study of the Performance of NetBSD on the Intel x86 Architecture[C]//Proc.of the ACM SIGMETRICS Conf.on Measurement and Modeling of Computer Systems.Seattle,USA:[s.n.],1997. 被引量:1
  • 7Lampson B W. A note on the confinement problem[J].CACM, 1973,16(10):613-615. 被引量:1
  • 8Dorothy Denning. A lattice model of secure information flow[J]. Comm of the ACM, 1976,19(5):236-246. 被引量:1
  • 9Richard A Kemmerer. Shared resource matrix methodo-logy: a practical approach to indetifying covert channels[J]. ACM Transactions on Computer Systems, 1983,1(3):256-277. 被引量:1
  • 10Richard A Kemmerer. A practical approach to identi-fying storage and timing channels: twenty years later[A].In:Proceedings of the 18th Annual Computer Security Applications Conference 2002 IEEE[C].USA: Washington DC, IEEE Computer Society, 2002. 被引量:1

共引文献5

;
使用帮助 返回顶部