DocumentCode
2137807
Title
Multiple Trojan horse systems and covert channel analysis
Author
Trostle, Jonathan T.
Author_Institution
Mitre Corp., Bedford, MA, USA
fYear
1991
fDate
18-20 Jun 1991
Firstpage
22
Lastpage
33
Abstract
The multiple Trojan horse system is a finite-state deterministic model with a high-level transmitter Trojan horse process, a low-level receiver Trojan horse process, and m conspiring Trojan horse processes. The conspiring processes attempt to aid the downgrading of data from the transmitter to the receiver. The capacity of a multiple Trojan horse system is a measure of the amount of information the high-level process can disclose to the low-level process. Any controlled signalling system can be viewed as a multiple Trojan horse system. The author gives an optimality equation which gives a way to recursively construct optimal strategies for both the receiver and conspiring processes. Computer algorithms can be constructed to iteratively compute the capacity and optimal strategies
Keywords
computer viruses; security of data; conspiring Trojan horse processes; controlled signalling system; covert channel analysis; finite-state deterministic model; high-level transmitter Trojan horse process; low-level receiver Trojan horse; multiple Trojan horse system; Algorithm design and analysis; Control system synthesis; Control systems; Equations; Horses; Invasive software; Iterative algorithms; Process control; Signal processing; Transmitters;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location
Franconia, NH
Print_ISBN
0-8186-2215-6
Type
conf
DOI
10.1109/CSFW.1991.151565
Filename
151565
Link To Document