Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2009-07
Add to Favorite Get Latest Update

Analysis of covert timing channels based on operational semantics

DAI Mei1, SUN Guo-qiang1, LIU Zhi-feng2 (1. School of Computer and Electical Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China; 2.School of Computer Science And Telecommunication Engineering, Jiangsu University, Zhenjiang 212013, China)  
More hot topic is discussed in the field of computer information security —covert timing channels based on operational semantics. According to its characteristics and existing condition of covert timing channel in covert channel, then the methods of searching based on its characteristics is proposed. The methods of searching considers process as an abstract machine, based on the reasoning rules of Plotkin’s structured operational semantics, and the integral information conduction operational semantics model. The states transformation and transformation sequences of two high and low security levels of the abstract machine are analyzed, and finally studying visual windows, then find the exsting covert timing channel.
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 XU Qin-gui1,2,LIU Gui-xiong1(1.School of Mechanical and Automotive Engineering,South China University of Technology,Guangzhou 510640,China;2.School of Computer,Dongguan University of Technology,Dongguan 523808,China);Defense model against cheating backdoors in applications[J];Computer Engineering and Design;2010-11
【Citations】
Chinese Journal Full-text Database 3 Hits
1 WANG Chang-Da;JU Shi-Guang;YANG Zhen;GUO Dian-Chun School of Computer Science and Telecommunications, Jiangsu University1, Zhengjiang, Jiangsu 212013 School of Computer Science, Carleton University2, Ottawa, Ontario, Canada K1S 5B6;The Minimum Criteria of Covert Channels' Existence and its Application[J];Computer Science;2005-01
2 Feng Yulin,Li Jing and Huang TaoInstitute of Software,Academia Sinica,Beijing 100080;OBJECT SEMANTICS THEORY AND CONSTRAINTS REASONING[J];Chinese Journal of Computers;1993-11
3 LIU Zhi-feng,JU Shi-guang,LI Pei(School of Computer Science & Telecommunication Engineering,Jiangsu University,Zhenjiang Jiangsu 212013,China);Analysis of covert channels in disk arm based on operational semantics[J];Application Research of Computers;2007-11
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YU Fan hua,FU Miao miao,WANG Sheng feng (The Institute of Information & Technology Changchun Teachers College,Changchun 130032,China);How to Reallize Fast and Dynamic Bind in Use of Method Name in Orient Language[J];Journal of Changchun Teachers College;2002-05
2 Nan Mingxing,Zhao Dongfan,Han Dianping,Li Tianbo (Dept.of Computer Eng.,Changchun Post and Telecommun.Inst.,130012 Changchun);Implementation of the fourth level of No 7 signalling system[J];JOURNAL OF CHANGCHUN POST AND TELECOMMUNICATION INSTITUTE;1997-03
3 Zhao Bo;Li Wen(Dept.of Computer Science)(Dept.of Electrical Engneering);Precompiler System Structure Design for Recursive Transform in C Programming[J];JOURNAL OF DALIAN RAILWAY INSTITUTE;1996-01
4 Li Wen; Zhu Liming(Dept. of Electrical Engineering);Study Status Quo on the Task Translation Model of Hierarchically Intelligent Control Systems[J];JOURNAL OF DALIAN RAILWAY INSTITUTE;1996-02
5 ZHANG Yu1,2,PING Long-mei1,3(1.Faculty of Computer Science and Technology of Suzhou University,Suzhou 215000,China; 2.ShangHai Ronsing Investment CO.,LTD,Shanghai 200127,China; 3.ShouZhou Hospital of Traditional Chinese Medicine,Suzhou 215021,China);Formal Requirement Analysis Method Based on Agile Modeling[J];Computer Knowledge and Technology;2008-34
6 LIUFu-chun(FacultyofAppliedMathematics,GuangdongUniversityofTechnology,Guangzhou510090,China);Institution of equational logic and its properties[J];Journal of Guangdong Non-ferrous Metals;2005-01
7 Li Kan; Wang Bingshan; Li Zhoujun(Department of Computer, NUDT, Changsha, 410073);On Calculus Semantics of Concurrent Object-Oriented Language[J];JOURNAL OF NATIONAL UNIVERSITY OF DEFENSE TECHNOLOGY;1996-01
8 WANG Cai\|fen (Dept of Computer Science, Northwest Normal University, Lanzhou 730070, China);PROOF OF PROGRAM CORRECTNESS AND A METHOD OF GETTING LOOP INVARIANT[J];JOURNAL OF GANSU SCIENCES;2000-03
9 BAI JIN-shan LI Xiang(Institute of Computer Science,Guizhou University,Guiyang 550025,China);The Design Implementing and Improving of Subsequent Procedure Validating CPV[J];Journal of Guizhou University(Natural Science Edition);2008-01
10 LIN Tian-rong,JIANG Jian-min(School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350108,China);A Logic Semantic for UML Activity Diagrams[J];Journal of Fujian Normal University(Natural Science Edition);2010-03
China Proceedings of conference Full-text Database 2 Hits
1 XIAO Jing CHEN Shu (Computer School of Wuhan University,Wuhan 430079,China);Semantics and Validation of Workflow Models[A];[C];2009
2 LIU Yong-po~(1,2) YAN Hai-hua~1 ZHANG Mao~1 LIU Xue-mei~2 1.School of Computer Science and Technology,Bei.iing University of Aeronautics and Astronautics,Bei.iing 100083,China 2.School of Computer & Information Technology,Daqing Petroleum Institute,Heilongjiang 163318,China;Research and implement of the managing and monitoring system for testing flow[A];[C];2008
【Co-references】
Chinese Journal Full-text Database 4 Hits
1 YAO Li-hong1,2,ZI Xiao-chao1,2,LI Jian-hua1 (1.School of Information Security Engineering,Shanghai Jiaotong University,Shanghai 200240,China; 2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing,Jiangsu 210093,China);An Information Transmission Model for Covert Channel[J];Acta Electronica Sinica;2008-11
2 WANG Chang-Da;JU Shi-Guang;YANG Zhen;GUO Dian-Chun School of Computer Science and Telecommunications, Jiangsu University1, Zhengjiang, Jiangsu 212013 School of Computer Science, Carleton University2, Ottawa, Ontario, Canada K1S 5B6;The Minimum Criteria of Covert Channels' Existence and its Application[J];Computer Science;2005-01
3 XIA Nai LIN Zhi-Qiang MAO Bing XIE Li(National Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093);A Survey on Covert Channel Identification[J];Computer Science;2006-12
4 ZHUANG Si hua 1,2 ,WANG Jian 1,ZHANG Fu xin 1,2 (1.Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China;2.School of Graduate, Chinese Academy of Sciences , Beijing 100039, China);Detecting VFS Kernel Backdoor Software in Linux[J];Application Research of Computers;2005-05
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 Feng Yulin(Institute of Software, Academta Sinica, Beijing 100080);ALGEBRAIC SPECIFICATION AND BEHAVIOUR CONSTRAINTS OF ABSTRACT OBJECT[J];Chinese Journal of Computers;1992-12
2 Yang Tao and Chen FujieDept. of Computer Science,National University of Defense and TechnologyrChangsha 410073Shen ChangxiangNaval Institute of Computing Technology,Beijing 100841;DESIGN OF A SECURE OPERATING SYSTEM S-UNIX[J];Chinese Journal of Computers;1993-06
3 Feng Yulin,Li Jing and Huang TaoInstitute of Software,Academia Sinica,Beijing 100080;OBJECT SEMANTICS THEORY AND CONSTRAINTS REASONING[J];Chinese Journal of Computers;1993-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved