DocumentCode :
564739
Title :
An Experience Using Two Covert Channel Analysis Techniques On a Real System Design
Author :
Haigh, J.Thomas ; Kemmerer, Richard A. ; Mchugh, John ; Young, William D.
Author_Institution :
Honeywell Secure Computing Technology Center
fYear :
1986
fDate :
7-9 April 1986
Firstpage :
14
Lastpage :
14
Abstract :
This paper examines the application of two covert channel analysis techniques to a high level design for a real system the Honeywell Secure Ada Target (SAT). The techniques used were a version of the non-interference model of multilevel security due to Goguen and Meseguer and the shared resource matrix method of Kemmerer. Both techniques were applied to the Gypsy abstract model of the SAT. The paper discusses the application of the techniques and the nature of the covert channels discovered. The relative strengths and weaknesses of the two methods are discussed and criteria for an ideal covert channel tool are developed.
Keywords :
Abstracts; Equations; Mathematical model; Mediation; Reactive power; Security; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1986 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0716-5
Type :
conf
DOI :
10.1109/SP.1986.10013
Filename :
6234863
Link To Document :
بازگشت