Categorizing and Identifying with Covert Channel Based on Information Flow Analysis

Article Preview

Abstract:

Based on the security OS (SLinux) designing and implementing, this paper adopted information flow sequence to represent information flows and covert channels. Categorized the covert channels according to their information flow characteristics and discussed the integral method of dealing with covert channel. On this basis, proposed a genera l framework for covert channel identification founded on information flow analysis, and designed the optimization rules of covert channel identification. The framework and the rules can decrease the illegal flow of misinformation by restricting in formation flow combination spread, and provide the basis process for improving of analyzing covert channel.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2512-2518

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] TAS I C R, GLIGOR V D, CHANDERSCKARAN C S. A formal method for the identification of covert storage channels in source code [J]. IEEE Trans on Software Engineering, 1990, 16(6): 569-580.

DOI: 10.1109/32.55086

Google Scholar

[2] QING Si-han, SHEN Chang-xiang. High level secure operating system design [J]. Science in China series E: Information Sciences, 2007, 3(2): 238-253.

Google Scholar

[3] DENN ING D E. A lattice model of secure information f low [J]. Communications of the ACM, 1976, 19( 5): 236-243.

Google Scholar

[4] PORRAS P A, KEMMERER R A. C overt f low tree: a technique for -identifying and analyzing covert storage channels [C] / /Proc of IEEE Computer Society Symposium on Research in Security and Privacy. 1991: 36- 51.

DOI: 10.1109/risp.1991.130770

Google Scholar

[5] QING Si-han, ZHU Ji-feng. Ansheng secure operating system of covert channel analysis [J]. Journal of software, 2004, 15(9): 1385-1392.

Google Scholar

[6] State Bureau of Technical Supervision. GB 17859-1999, marking public standards of computer information system security protection grade [S], (1999).

Google Scholar

[7] LIU Wen-qing, CHEN Zhe. Logo and processing of the covert channel [J]. Computer Engineering, 2006, 32(8): 1-3.

Google Scholar