Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems
نویسنده
چکیده
Covert channels are illicit means of leaking sensitive or private information through system global variables that usually are not part of the interpretation of data objects in the security model. We discovered that some covert channels can be modeled as finite-state graphs while others cannot. By using various techniques given in the paper, multiple bits of information can be simultaneously transferred through single or multiple covert channels. We present methods to determine and estimate the maximum bandwidths of both finite-state and infinite-state channels, and give the problems and basic rules for their measurement.
منابع مشابه
Verified Order-Based Transaction Scheduling Scheme for Multilevel Secure Database Management Systems
While the secure transaction schedulers in multilevel secure database systems synchronize transactions cleared at different security levels, they must consider the problem of covert channel. Through the covert channel, malicious users leak secret information in a way of intentional interference among the transactions that they invoked. Much work had been done for closing the covert channel. Alt...
متن کاملStarvation-Free Secure Multiversion Concurrency Control
Concurrency control is important for multilevel secure databases because a covert channel can be easily created through collaboration of multilevel transactions in most traditional concurrency control mechanisms. We, in this paper, propose a secure multiversion concurrency control mechanism. We present concepts of an invisible area and a t-lock to prevent retrieval anomaly and starvation of hig...
متن کاملAnalysis of Challenges in the Design and Development of Multi-Level Secure Databases
Database security mainly deal with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve Privilege Abuse, Weak Authentication, Weak Audit Trails and Operating System Vulnerabilities. To make the security least compromised; all users are required to follow the rules set up by Database Administrator. These rules are said to be Mandatory ...
متن کاملThe Concurrency Control and Recovery Problem for Multilevel Update Transactions in MLS System
This paper addresses the problem of a transaction reading and writing data at multiple classification levels in a Multilevel Secure (MLS) database. We refer to such transactions as multilevel update transactions. We show that no scheduler can ensure atomicity of multilevel update transactions in the presence of transaction aborts and at the same time be secure. There are essentially two ways of...
متن کاملAdvanced Transaction Processing in Multilevel Secure File Stores
The concurrency control requirements for transaction processing in a multilevel secure file system are different from those in conventional transaction processing systems. In particular, there is the need to coordinate transactions at different security levels avoiding both potential timing covert channels and the starvation of transactions at higher security levels. Suppose a transaction at a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 15 شماره
صفحات -
تاریخ انتشار 1999