• DocumentCode
    2137807
  • Title

    Multiple Trojan horse systems and covert channel analysis

  • Author

    Trostle, Jonathan T.

  • Author_Institution
    Mitre Corp., Bedford, MA, USA
  • fYear
    1991
  • fDate
    18-20 Jun 1991
  • Firstpage
    22
  • Lastpage
    33
  • Abstract
    The multiple Trojan horse system is a finite-state deterministic model with a high-level transmitter Trojan horse process, a low-level receiver Trojan horse process, and m conspiring Trojan horse processes. The conspiring processes attempt to aid the downgrading of data from the transmitter to the receiver. The capacity of a multiple Trojan horse system is a measure of the amount of information the high-level process can disclose to the low-level process. Any controlled signalling system can be viewed as a multiple Trojan horse system. The author gives an optimality equation which gives a way to recursively construct optimal strategies for both the receiver and conspiring processes. Computer algorithms can be constructed to iteratively compute the capacity and optimal strategies
  • Keywords
    computer viruses; security of data; conspiring Trojan horse processes; controlled signalling system; covert channel analysis; finite-state deterministic model; high-level transmitter Trojan horse process; low-level receiver Trojan horse; multiple Trojan horse system; Algorithm design and analysis; Control system synthesis; Control systems; Equations; Horses; Invasive software; Iterative algorithms; Process control; Signal processing; Transmitters;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Workshop IV, 1991. Proceedings
  • Conference_Location
    Franconia, NH
  • Print_ISBN
    0-8186-2215-6
  • Type

    conf

  • DOI
    10.1109/CSFW.1991.151565
  • Filename
    151565