Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Science》 2005-01
Add to Favorite Get Latest Update

The Minimum Criteria of Covert Channels' Existence and its Application

WANG Chang-Da;JU Shi-Guang;YANG Zhen;GUO Dian-Chun School of Computer Science and Telecommunications, Jiangsu University1, Zhengjiang, Jiangsu 212013 School of Computer Science, Carleton University2, Ottawa, Ontario, Canada K1S 5B6  
Covert channels can leak confidential information under the supervision of security mechanism,so its threat is very serious. By research on the working principle of covert channels,the minimum criteria of its existence had been formally proved. Based on it,the taxonomy for the methods of search and elimination in covert channels was given. Furthermore,each method's correctness and deficiency were represented theoretically. These were not only offered the theory bedrock for the work of search and eliminate covert channels,but also given a frame for develop new search and elimination methods in covert channels.
【Fund】: 国家自然科学基金(No.60373069);; 江苏省自然科学基金(No.BK200204)
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 4 Hits
1 SONG Xiang-mei,JU Shi-guang(School of Computer Science and Telecommunication Engineering,Jiangsu University,Zhenjiang Jiangsu 212013,China);Identification of covert channel based on source code[J];Journal of Computer Applications;2006-09
2 DAI Mei1, SUN Guo-qiang1, LIU Zhi-feng2 (1. School of Computer and Electical Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China; 2.School of Computer Science And Telecommunication Engineering, Jiangsu University, Zhenjiang 212013, China);Analysis of covert timing channels based on operational semantics[J];Computer Engineering and Design;2009-07
3 XU Qin-gui1,2,LIU Gui-xiong1(1.School of Mechanical and Automotive Engineering,South China University of Technology,Guangzhou 510640,China;2.School of Computer,Dongguan University of Technology,Dongguan 523808,China);Defense model against cheating backdoors in applications[J];Computer Engineering and Design;2010-11
4 WANG Chang-da1,2,JU Shi-guang1(1.School of Computer Science and Telecommunication Engineering,Jiangsu University,Zhenjiang 212013,China;2.School of Computer Science,Carleton University,Ottawa K1S 5B6,Canada);Simulation Analysis of Covert Channels[J];Journal of System Simulation;2006-06
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 YAO Li-hong1,2,ZI Xiao-chao1,2,LI Jian-hua1 (1.School of Information Security Engineering,Shanghai Jiaotong University,Shanghai 200240,China; 2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing,Jiangsu 210093,China);An Information Transmission Model for Covert Channel[J];Acta Electronica Sinica;2008-11
2 XIA Nai LIN Zhi-Qiang MAO Bing XIE Li(National Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093);A Survey on Covert Channel Identification[J];Computer Science;2006-12
3 GUO Dianchun ,JU Shiguang , YU Chuntang, YANG Zhen (School of Computer, Jiangsu University, Zhenjiang 212013);Covert Channel and Identification Methods[J];Computer Engineering;2003-17
4 Feng Yulin,Li Jing and Huang TaoInstitute of Software,Academia Sinica,Beijing 100080;OBJECT SEMANTICS THEORY AND CONSTRAINTS REASONING[J];Chinese Journal of Computers;1993-11
5 WANG Chang-da, JU Shi-guang (School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013, China);BLP model and its evolution[J];Journal of Jiangsu University (National Science Edition);2004-01
6 JU Shi-guang, SONG Xiang-mei(School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013,China);Information flow tree used to analyze information flows[J];Journal of Jiangsu University (National Science Edition);2005-05
7 ZHUANG Si hua 1,2 ,WANG Jian 1,ZHANG Fu xin 1,2 (1.Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China;2.School of Graduate, Chinese Academy of Sciences , Beijing 100039, China);Detecting VFS Kernel Backdoor Software in Linux[J];Application Research of Computers;2005-05
8 LIU Zhi-feng,JU Shi-guang,LI Pei(School of Computer Science & Telecommunication Engineering,Jiangsu University,Zhenjiang Jiangsu 212013,China);Analysis of covert channels in disk arm based on operational semantics[J];Application Research of Computers;2007-11
9 QING Si-Han1,2,3+, ZHU Ji-Feng1,2,3 1(Engineering Research Center for Information Security Technology, The Chinese Academy of Sciences, Beijing 100080, China) 2(Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China) 3(Graduate School, The Chinese Academy of Sciences, Beijing 100039, China) + Corresponding author: Phn: +86-10-62635150, E-mail: qsihan@ercist.iscas.ac.cn, http://www.iscas.ac.cn;Covet Channel Analysis on ANSHENG Secure Operating System[J];Journal of Software;2004-09
10 QING Si-Han1,2+ 1(Engineering Research Center for Information Security Technology, The Chinese Academy of Sciences, Beijing 100080, China) 2(Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China);Covert Channel Analysis in Secure Operating Systems with High Security Levels[J];Journal of Software;2004-12
【Secondary References】
Chinese Journal Full-text Database 5 Hits
1 WANG Chang-Da JU Shi-Guang ZHOU Cong-Hua SONG Xiang-Mei(School of Computer Science and Telecommunication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212013);A Measurement of Covert Channels Threat[J];Chinese Journal of Computers;2009-04
2 GUO Yun-chuan1,2,ZHOU Yuan3,DING Li3,GUO Li1 (1.Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100019,China;2.Graduate University of Chinese Academy of Sciences,Beijing 100049;China;3.National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing 100029,China);Simulation analysis of probabilistic covert channels based on probabilistic interference[J];Journal on Communications;2009-02
3 XU Qin-gui1,2,LIU Gui-xiong1(1.School of Mechanical and Automotive Engineering,South China University of Technology,Guangzhou 510640,China;2.School of Computer,Dongguan University of Technology,Dongguan 523808,China);Defense model against cheating backdoors in applications[J];Computer Engineering and Design;2010-11
4 WANG Chang-da,JU Shi-guang,SONG Xiang-mei(School of Computer Science and Telecommunication Engineering,Jiangsu University,Zhenjiang 212013,China);Dynamic Method for Covert Channels Elimination[J];Journal of Chinese Computer Systems;2009-02
5 Chang-da WANG1,2, Shi-guang JU1 (1School of Computer Science and Telecommunications Engineering, Jiangsu University, Zhenjiang 212013, China) (2School of Computer Science, Carleton University, Ottawa, Ontario K1S 5B6, Canada);Integrated criteria for covert channel auditing[J];浙江大学学报A(应用物理及工程版)(英文版);2008-06
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved