Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Science》 2007-10
Add to Favorite Get Latest Update

On the Principle of Information Transfer in Covert Channel

LIU Zhi-Feng JU Shi-Guang WANG Chang-Da ZHOU Cong-Hua (School of Computer Science and Telecommunication Engineering,Jiangsu University,Jiangsu Zhenjiang 212013)  
Some covert information flow evades the inspection of security mechanism in trusted computer system,which results in information leakage.The atomic channel model was established by analyzing and abstracting the principle of covert information flow.A finite state machine was used to describe an atomic channel model Based on the structured operational semantics proposed by Plotkin we can compute sequences of states.By reasoning on state sequences against the definition of covert channel,restriction conditions of secure state translation were gained,and the principle of infor- mation leakage in two atomic channel models sharing an object was found.Consequently a covert channel identification method based on operational semantics was proposed.The experiment on elevator dispatch algorithm showed that our method could search for covert channels efficiently.
【Fund】: 本课题受到国家自然科学基金(编号:60573046)的资助。
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Feng Yulin,Li Jing and Huang TaoInstitute of Software,Academia Sinica,Beijing 100080;OBJECT SEMANTICS THEORY AND CONSTRAINTS REASONING[J];Chinese Journal of Computers;1993-11
Chinese Journal Full-text Database 10 Hits
1 YU Fan hua,FU Miao miao,WANG Sheng feng (The Institute of Information & Technology Changchun Teachers College,Changchun 130032,China);How to Reallize Fast and Dynamic Bind in Use of Method Name in Orient Language[J];Journal of Changchun Teachers College;2002-05
2 LIU Wen-qing1,HAN Nai-ping2,CHEN Zhe1(1.Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou,Henan 450004,China;2.China Standard Software Co,LTD.24/F Neiwailian Building,NO.518,Shangcheng Road,Shanghai 200120,China);Identifying and Dealing with Covert Channel of the Secure OS-SLinux[J];Acta Electronica Sinica;2007-01
3 SI Tian-ge,TAN Zhi-yong,LIU Duo,DAI Yi-qi (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);A Noninterference Model Based on Actions for Nondeterministic Systems[J];Acta Electronica Sinica;2008-11
4 WANG Bao-hua~1,LI Dan-ning~2,MA Xin-qiang~1,ZHANG Heng~1(1 School of Information Project,Guizhou University,Guiyang 550003;2 Guizhou Academy of Science,Guiyang 550001);COVERT CHANNEL ANALYSIS OF SECURITY DATABASE BASED ON LOGIC SQL[J];Guizhou Science;2006-04
5 ZHANG Shiming, HE Shoucai (Database Research Institute, Shanghai Second Polytechnic University, Shanghai 201209);Design of Database System Covert Channel Analysis[J];Computer Engineering;2006-18
6 Feng Yulin; Huang Tao and Wu Xiaopeng(Laboratory of Computer Science, Instute of Sofware, The Vhinese Academy of Sciences:Beijing 100080);RESEARCH ON COMPONENT SOFTWARE ENGINEERING IN OBJECT ORIENTATION[J];CHINESE JOURNAL OF COMPUTERS;1996-03
7 WANG Yan-bo1,ZHANG Kai-ze1,DUANMU Qing-fen2,WANG Jing-yu3 (1.Department of Electronic Information Engineering ICE,PLAUST,Nanjing 210007,China;2.Postgradute Team 4 ICE,PLAUST;3.Department of Basic Electronic IS,PLAUST,Nanjing 211101,China);Classification of Generalized Information Hiding Technology[J];Journal of Military Communications Technology;2007-04
8 LIU Zhi-feng,JU Shi-guang,LI Pei(School of Computer Science & Telecommunication Engineering,Jiangsu University,Zhenjiang Jiangsu 212013,China);Analysis of covert channels in disk arm based on operational semantics[J];Application Research of Computers;2007-11
9 Zhao Ke;Ye Shanghui (Xi'an University of Eleetroronic Seience and Technology, Xi'an 710071);A Resource Model for Object-Oriented Design Knowledge Representation[J];MECHANICAL SCIENCE AND TECHNOLOGY;1995-04
10 Cao Chun (Office of Education Northwest China Institute for Nationalities, Lanzhou 730030);Algebraic semantics and inheritance of an abstract class with trace[J];JOURNAL OF LANZHOU RAILWAY INSTITUTE;1999-02
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Feng Yulin(Institute of Software, Academta Sinica, Beijing 100080);ALGEBRAIC SPECIFICATION AND BEHAVIOUR CONSTRAINTS OF ABSTRACT OBJECT[J];Chinese Journal of Computers;1992-12
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved