期刊文献+

一种基于信息流脉络网的隐蔽通道搜索方法 被引量:1

Method for covert channels identification based on information flow veined net
下载PDF
导出
摘要 针对隐蔽流树搜索方法存在的规模大、分析工作量繁重等问题,提出一种改进的隐蔽通道搜索方法。该方法采用网结构描述系统中的隐蔽信息流,提出网中隐蔽通道的判定规则;依据判定规则在深度优先搜索网中隐蔽通信路径过程中排除合法通道;结合路径中的操作序列构造隐蔽通道工作场景,从而发现系统中的隐蔽通道。实例分析和对比表明,该方法可以弥补隐蔽流树搜索方法的不足。 To avoid covert flow tree (CFT)method's problems, this paper proposed an improved method for detecting covert channels. The method defined a net structure offering covert information flows of systems. It presented the criterion rules to exclude legal channels from covert channels in nets, and gained the operation sequences when searching for the paths in nets. In- stantial analysis shows the method can catch up on the shortage of CFT method.
出处 《计算机应用研究》 CSCD 北大核心 2013年第8期2506-2509,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61003288 61111130184) 国家教育部博士点基金资助项目(20093227110005) 江苏省自然科学基金资助项目(BK2010192)
关键词 隐蔽通道 信息流脉络网 隐蔽流树 可信计算机系统 covert channel information flow veined net covert flow tree trusted computer system
  • 相关文献

参考文献12

二级参考文献62

共引文献48

同被引文献17

  • 1卿斯汉,朱继锋.安胜安全操作系统的隐蔽通道分析[J].软件学报,2004,15(9):1385-1392. 被引量:19
  • 2LAMPSON B W. A note on the confinement problem [ J]. Communications of the ACM, 1973, 16(10) : 613 -615. 被引量:1
  • 3TSAI C R, GLIGOR V D, CHANDERSEKARAN C S. On the identification of covert storage channels in secure systems [ J]. IEEE Transactions on Software Engineering, 1990, 16(6): 569 -580. 被引量:1
  • 4ZANDER S, ARMITAGE G, BRANCH P. A survey of covert channels and countermeasures in computer network protocols [ J]. IEEE Communication Surveys and Tutorials, 2007, 9(3) : 44 - 57. 被引量:1
  • 5WU Z, XU Z, WANG H. Whispers in the hyper-space: high-speed covert channel attacks in the cloud [C]// Security '12: Proceedings of the 21st USENIX Conference on Security Symposium. Berkeley, CA: USENIX Association, 2012:159 - 173. 被引量:1
  • 6RISTENPART T, TROMER E, SHACHAM H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds [C]//CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: ACM, 2009:199-212. 被引量:1
  • 7KEMMERER R A. Shared resource matrix methodology: an approach to identifying storage and timing channels [ J]. ACM Transactions on Computer Systems, 1983, 1 (3) : 256 - 277. 被引量:1
  • 8DENNING D E. A lattice model of secure information flow [J]. Communications of the ACM, 1976, 19(5) : 236 -243. 被引量:1
  • 9TSM C R, GLICA)R V D, CHANDERSEKARAN C S. A formal method for the identification of covert storage channels in source code [ C]// Proceedings of the 1987 IEEE Symposium on Security and Privacy.Washington, DC: IEEE Computer Society, 1987: 74. 被引量:1
  • 10GOGUEN J A, MESEGUER J. Security policies and security models [ C] // Proceedings of the 1982 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1982: 11. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部