• DocumentCode
    1842829
  • Title

    Towards a model of storage jamming

  • Author

    McDermott, John ; Goldschlag, David

  • Author_Institution
    Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
  • fYear
    1996
  • fDate
    10-12 Jun 1996
  • Firstpage
    176
  • Lastpage
    185
  • Abstract
    Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Unity logic. We find that Unity logic, in conjunction with some high-level operators, models storage jamming in a natural way and allows us to reason about susceptibility, rate of jamming, and impact on persistent values
  • Keywords
    access control; cryptography; security of data; Unity logic; access controls; cryptographic techniques; detection mechanism; high-level operators; persistent values; rate of jamming; storage jamming model; susceptibility; Access control; Application software; Cryptography; Database systems; Degradation; Information systems; Invasive software; Jamming; Laboratories; Logic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Workshop, 1996. Proceedings., 9th IEEE
  • Conference_Location
    Kenmare
  • ISSN
    1063-6900
  • Print_ISBN
    0-8186-7522-5
  • Type

    conf

  • DOI
    10.1109/CSFW.1996.503703
  • Filename
    503703