Scenarios and Covert Channels: Another Game
نویسندگان
چکیده
Covert channels are information leaks in systems that use resources to transfer secretly a message. They are a threat for security, performance, but also for a system’s profitability. This paper proposes a new approach to detect covert channels from scenario models of protocols. The problem of finding covert channels in scenarios is first modeled as a game, in which a pair of malicious users {S,R} is trying to transfer information while the rest of the protocol tries to prevent it. The messages transferred are encoded by behavioral choices at some precise moments, and decoded by a transducer whose input vocabulary is an observation of the system. We then characterize the presence of a covert channel as the existence of a winning strategy for {S,R} and of a decoder.
منابع مشابه
Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
This paper argues the need for providing a covert backchannel communication mechanism in authentication protocols, discusses various practical uses for such a channel, and desirable features for its design and deployment. Such a mechanism would leverage the current authentication channel to carry out the covert communication rather than introducing a separate one. The communication would need t...
متن کاملCovert channels detection in protocols using scenarios
This paper presents an approach to detect illegal information flows from requirements expressed as high-level scenarios.
متن کاملCovert channels in combinatorial games
A general framework for exploiting covert channels in combinatorial games is presented. The framework is applicable to all combinatorial games, including Chess and Go, but is applied to the game of Tic-Tac-Toe for ease of experimental analysis. The security and capacity of the resulting covert channel are analyzed experimentally. By considering the ways in which a passive adversary can attempt ...
متن کاملCountermeasures and Tradeoos for a Class of Covert Timing Channels Index Terms
We identify a class of covert timing channels with the following properties. (1) existing covert timing channel analysis techniques are inappropriate for the channels in this class; and (2) it includes the fastest (i.e., highest capacity) covert channels known to date. Since channels in this class are exploited by counting the occurrences of certain events, we call them counting channels. We de...
متن کاملA novel covert channel detection method in cloud based on XSRM and improved event association algorithm
Covert channel is a major threat to the information system security and commonly found in operating systems, especially in cloud computing environment. Owing to the characteristics in cloud computing environment such as resources sharing and logic boundaries, covert channels become more varied and difficult to find. Focusing on those problems, this paper presents a universal method for detectin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electr. Notes Theor. Comput. Sci.
دوره 119 شماره
صفحات -
تاریخ انتشار 2005