메뉴 건너뛰기




Volumn , Issue , 2007, Pages 326-340

Comparing countermeasures against interrupt-related covert channels in an information-theoretic framework

Author keywords

[No Author keywords available]

Indexed keywords

COVERT CHANNEL ANALYSIS; INTERRUPT-RELATED CHANNELS;

EID: 35048834771     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.14     Document Type: Conference Paper
Times cited : (9)

References (49)
  • 1
    • 0015287895 scopus 로고
    • An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels
    • S. Arimoto. An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels. IEEE Transactions on Information Theory, 18(1):14-20, 1972.
    • (1972) IEEE Transactions on Information Theory , vol.18 , Issue.1 , pp. 14-20
    • Arimoto, S.1
  • 3
    • 0015376113 scopus 로고
    • Computation of Channel Capacity and Rate-Distortion Functions
    • R. Blahut. Computation of Channel Capacity and Rate-Distortion Functions. IEEE Transactions on Information Theory, 18(4):460-473, 1972.
    • (1972) IEEE Transactions on Information Theory , vol.18 , Issue.4 , pp. 460-473
    • Blahut, R.1
  • 5
    • 35048870986 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation Version 2.3, 2005
    • Common Criteria for Information Technology Security Evaluation Version 2.3, 2005.
  • 6
    • 35048837014 scopus 로고    scopus 로고
    • Intel Corporation. Interrupt Moderation Using Intel Gigabit Ethernet Controllers, Application Note (AP-450), Revision 1.1,2003.
    • Intel Corporation. Interrupt Moderation Using Intel Gigabit Ethernet Controllers, Application Note (AP-450), Revision 1.1,2003.
  • 8
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 9
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 10
    • 0003562729 scopus 로고
    • A Technique for Proving Specifications are Multilevel Secure
    • Technical Report CSL-109, Computer Science Laboratory, SRI International
    • R. Feiertag. A Technique for Proving Specifications are Multilevel Secure. Technical Report CSL-109, Computer Science Laboratory, SRI International, 1980.
    • (1980)
    • Feiertag, R.1
  • 18
    • 11944266539 scopus 로고
    • Information Theory and Statistical Mechanics
    • E. T. Jaynes. Information Theory and Statistical Mechanics. Physical Review, (106):620-630, 1957.
    • (1957) Physical Review , vol.106 , pp. 620-630
    • Jaynes, E.T.1
  • 19
    • 35048828743 scopus 로고    scopus 로고
    • S. M. Kay. Fundamentals of Statistical Signal Processing, I: Estimation Theory. Prentice Hall, 1993.
    • S. M. Kay. Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory. Prentice Hall, 1993.
  • 20
    • 84976667065 scopus 로고
    • Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
    • R. A. Kemmerer. Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems, 1(3):256-277, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 21
    • 84948947266 scopus 로고    scopus 로고
    • A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
    • R. A. Kemmerer. A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. In 18th Annual Computer Security Applications Conference, pages 109-118, 2002.
    • (2002) 18th Annual Computer Security Applications Conference , pp. 109-118
    • Kemmerer, R.A.1
  • 22
    • 0027719713 scopus 로고    scopus 로고
    • M. H. Kang and I. S. Moskowitz. A Pump for Rapid, Reliable, Secure Communication. In ACM Conference on Computer and Communications Security, pages 119-129, 1993.
    • M. H. Kang and I. S. Moskowitz. A Pump for Rapid, Reliable, Secure Communication. In ACM Conference on Computer and Communications Security, pages 119-129, 1993.
  • 25
    • 0025137215 scopus 로고    scopus 로고
    • P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A VMM Security Kernel for the VAX Architecture. In IEEE Symposium on Security and Privacy, pages 2-19, 1990.
    • P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A VMM Security Kernel for the VAX Architecture. In IEEE Symposium on Security and Privacy, pages 2-19, 1990.
  • 26
    • 0015672289 scopus 로고
    • A Note on the Confinement Problem
    • B. W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 27
    • 35048895703 scopus 로고    scopus 로고
    • Seagate Technology LLC. Product Manual Barracuda 7200.7 Serial ATA, 2005.
    • Seagate Technology LLC. Product Manual Barracuda 7200.7 Serial ATA, 2005.
  • 29
    • 8644270771 scopus 로고
    • Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems
    • J. McHugh. Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems. NRL Technical Memorandum 5540:080A, 1995.
    • (1995) NRL Technical Memorandum , vol.5540
    • McHugh, J.1
  • 31
    • 0016951438 scopus 로고
    • Security Kernel Validation in Practice
    • J. K. Millen. Security Kernel Validation in Practice. Communications of the ACM, 19(5):243-250, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 37
    • 35048886450 scopus 로고
    • Variable Noise Effects Upon a Simple Timing Channel
    • I. S. Moskowitz. Variable Noise Effects Upon a Simple Timing Channel. In IEEE Symposium on Security and Privacy, pages 362-372, 1991.
    • (1991) IEEE Symposium on Security and Privacy , pp. 362-372
    • Moskowitz, I.S.1
  • 41
    • 84856043672 scopus 로고
    • A Mathematical Theory of Communication
    • and
    • C. Shannon. A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656, 1948.
    • (1948) Bell System Technical Journal , vol.27
    • Shannon, C.1
  • 44
    • 35048881887 scopus 로고    scopus 로고
    • Department of Defense Trusted Computer System Evaluation Criteria (TCSEC), DOD 5200.28-STD, 1985.
    • Department of Defense Trusted Computer System Evaluation Criteria (TCSEC), DOD 5200.28-STD, 1985.
  • 46
    • 35048874114 scopus 로고    scopus 로고
    • The MathWorks. xPC Target Realtime Kernel http://www.mathworks.com/ access/helpdesk/help/toolbox/xpc/ug/ f5-15620.html, April 12th 2007.
    • The MathWorks. xPC Target Realtime Kernel http://www.mathworks.com/ access/helpdesk/help/toolbox/xpc/ug/ f5-15620.html, April 12th 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.