DocumentCode
1842829
Title
Towards a model of storage jamming
Author
McDermott, John ; Goldschlag, David
Author_Institution
Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
fYear
1996
fDate
10-12 Jun 1996
Firstpage
176
Lastpage
185
Abstract
Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Unity logic. We find that Unity logic, in conjunction with some high-level operators, models storage jamming in a natural way and allows us to reason about susceptibility, rate of jamming, and impact on persistent values
Keywords
access control; cryptography; security of data; Unity logic; access controls; cryptographic techniques; detection mechanism; high-level operators; persistent values; rate of jamming; storage jamming model; susceptibility; Access control; Application software; Cryptography; Database systems; Degradation; Information systems; Invasive software; Jamming; Laboratories; Logic;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop, 1996. Proceedings., 9th IEEE
Conference_Location
Kenmare
ISSN
1063-6900
Print_ISBN
0-8186-7522-5
Type
conf
DOI
10.1109/CSFW.1996.503703
Filename
503703
Link To Document