Covert Channel Synthesis for Transducers

نویسندگان

  • Gilles Benattar
  • Béatrice Bérard
  • Didier Lime
  • John Mullins
  • Olivier H. Roux
  • Mathieu Sassolas
چکیده

Covert channels are a security threat for information systems, since they permit illegal flows, and sometimes leaks, of classified data. Although numerous descriptions have been given at a concrete level, relatively little work has been carried out at a more abstract level, outside probabilistic models. In this paper, we propose a definition of covert channels based on encoding and decoding binary messages with transducers, in a finite transition system. We first compare this notion of covert channel with a similar one called iterated interference. We then give a necessary condition for the existence of a covert channel. Unfortunately, in the general case of our setting, it turns out that the existence of a covert channel is undecidable. However, restricting to functional systems, we obtain a PTIME procedure to decide the existence of a covert channel. Keyword: Security, Covert Channels, Non-interference, Transducers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert Channels with Sequential Transducers⋆

Covert channels represent a security problem for information systems, since they permit illegal flows and sometimes leaks of classified data. Although numerous descriptions have been given at a concrete level, relatively few work has been carried out at a more abstract level. In this paper, we propose a definition for covert channels based on encoding and decoding binary messages with transduce...

متن کامل

طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندی‌دار در شبکه اینترنت

Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...

متن کامل

C2Detector: a covert channel detection framework in cloud computing

Cloud computing is becoming increasingly popular because of the dynamic deployment of computing service. Another advantage of cloud is that data confidentiality is protected by the cloud provider with the virtualization technology. However, a covert channel can break the isolation of the virtualization platform and leak confidential information without letting it known by virtual machines. In t...

متن کامل

Design of Transport Layer Based Hybrid Covert Channel Detection Engine

Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitim...

متن کامل

A Timing Channel Spyware Robust to MAC Random Back-off

This paper presents the design and implementation of spyware communication circuits built into the widely used Carrier Sense Multiple Access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010