DocumentCode :
1073233
Title :
Covert flow trees: a visual approach to analyzing covert storage channels
Author :
Kemmerer, Richard A. ; Porras, Phillip A.
Author_Institution :
Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
Volume :
17
Issue :
11
fYear :
1991
fDate :
11/1/1991 12:00:00 AM
Firstpage :
1166
Lastpage :
1185
Abstract :
The authors introduce a technique for detecting covert storage channels using a tree structure called a covert flow tree (CFT). CFTs are used to perform systematic searches for operation sequences that allow information to be relayed through attributes and eventually detected by a listening process. When traversed, the paths of a CFT yield a comprehensive list of operation sequences which support communication via a particular resource attribute. These operation sequences are then analyzed and either discharged as benign or determined to be covert communication channels. Algorithms for automating the construction of CFTs and potential covert channel operation sequences are presented. To illustrate this technique, two example systems are analyzed and their results compared to two currently accepted analysis techniques performed on identical systems. This comparison shows that the CFT approach not only identified all covert storage channels found by the other analysis techniques, but discovered a channel not detected by the other techniques
Keywords :
security of data; trees (mathematics); attributes; covert channel operation sequences; covert flow tree; covert storage channels; listening process; resource attribute; tree structure; Bandwidth; Communication channels; Information analysis; Inspection; Multilevel systems; Performance analysis; Relays; Timing; Tree data structures; Tree graphs;
fLanguage :
English
Journal_Title :
Software Engineering, IEEE Transactions on
Publisher :
ieee
ISSN :
0098-5589
Type :
jour
DOI :
10.1109/32.106972
Filename :
106972
Link To Document :
بازگشت