메뉴 건너뛰기




Volumn 5491 LNCS, Issue , 2009, Pages 67-81

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH ANALYSIS; COVERT CHANNELS; FORMAL MODEL; MODELING AND ANALYSIS;

EID: 67650675360     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01465-9_5     Document Type: Conference Paper
Times cited : (10)

References (38)
  • 1
    • 35048834771 scopus 로고    scopus 로고
    • Comparing countermeasures against interrupt-related covert channels in an information-theoretic framework
    • DOI 10.1109/CSF.2007.14, 4271658, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
    • Mantel, H., Sudbrock, H.: Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. In: Proc. of the IEEE Computer Security Foundations Symposium, pp. 326-340 (2007) (Pubitemid 47554223)
    • (2007) Proceedings - IEEE Computer Security Foundations Symposium , pp. 326-340
    • Mantel, H.1    Sudbrock, H.2
  • 2
    • 0015672289 scopus 로고
    • A Note on the Confinement Problem
    • Lampson, B.W.: A Note on the Confinement Problem. Communications of the ACM 16(10), 613-615 (1973)
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 3
    • 0010512569 scopus 로고
    • A GuiDe to Understanding Covert Channel Analysis of Trusted Systems
    • Gligor, V.: A GuiDe to Understanding Covert Channel Analysis of Trusted Systems. CSCTG-030, Rainbow Series (Light Pink Book) (1993)
    • (1993) CSCTG-030 Rainbow Series (Light Pink Book)
    • Gligor, V.1
  • 4
    • 0032714529 scopus 로고    scopus 로고
    • Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems
    • Shieh, S.P.: Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. Journal of Inform. Science & Engineering 15, 91-106 (1999)
    • (1999) Journal of Inform. Science & Engineering , vol.15 , pp. 91-106
    • Shieh, S.P.1
  • 6
    • 38049101307 scopus 로고    scopus 로고
    • Hiding Information in Multi Level Security Systems
    • In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.). LNCS. Springer, Heidelberg
    • Beauquier, D., Lanotte, R.: Hiding Information in Multi Level Security Systems. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.4691, pp. 250-269. Springer, Heidelberg (2007)
    • (2007) FAST 2006 , vol.4691 , pp. 250-269
    • Beauquier, D.1    Lanotte, R.2
  • 7
    • 33845924790 scopus 로고    scopus 로고
    • Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems
    • 1652117, Proceedings of the 2006 IEEE Workshop on Information Assurance
    • Son, J., Alves-Foss, J.: Covert Timing Channel Analysis of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems. In: Proc. of the IEEE Information Assurance Workshop, pp. 361-368 (2006) (Pubitemid 46028779)
    • (2006) Proceedings of the 2006 IEEE Workshop on Information Assurance , vol.2006 , pp. 361-368
    • Son, J.1    Alves-Foss, J.2
  • 9
    • 0015287895 scopus 로고
    • An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels
    • Arimoto, S.: An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels. IEEE Trans. on Information Theory 18(1), 14-20 (1972)
    • (1972) IEEE Trans. on Information Theory , vol.18 , Issue.1 , pp. 14-20
    • Arimoto, S.1
  • 10
    • 0015376113 scopus 로고
    • Computation of Channel Capacity and Rate-Distortion Functions
    • Blahut, R.: Computation of Channel Capacity and Rate-Distortion Functions. IEEE Trans. on Information Theory 18(4), 460-473 (1972)
    • (1972) IEEE Trans. on Information Theory , vol.18 , Issue.4 , pp. 460-473
    • Blahut, R.1
  • 11
    • 67650664425 scopus 로고    scopus 로고
    • Interrupt Moderation Using Intel Gigabit Ethernet Controllers
    • Revision 1.1
    • Intel Corporation: Interrupt Moderation Using Intel Gigabit Ethernet Controllers, Application Note (AP-450), Revision 1.1 (2003)
    • (2003) Application Note (AP-450)
    • Intel Corporation1
  • 13
    • 0002407118 scopus 로고
    • On the Global Minimization of Concave Functions
    • Horst, R.: On the Global Minimization of Concave Functions. OR Spectrum 6(4), 195-205 (1984)
    • (1984) OR Spectrum , vol.6 , Issue.4 , pp. 195-205
    • Horst, R.1
  • 14
    • 0030242902 scopus 로고    scopus 로고
    • Deterministic algorithms for constrained concave minimization: A unified critical survey
    • Benson, H.P.: Deterministic Algorithms for Constrained Concave Minimization: A Unified Critical Survey. Naval Research Logistics 43(6), 765-795 (1996) (Pubitemid 126579380)
    • (1996) Naval Research Logistics , vol.43 , Issue.6 , pp. 765-795
    • Benson, H.P.1
  • 15
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236-243 (1976)
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 16
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • Denning, D.E., Denning, P.J.: Certification of Programs for Secure Information Flow. Communications of the ACM 20(7), 504-513 (1977)
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 17
    • 84976667065 scopus 로고
    • Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
    • Kemmerer, R.A.: Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Trans. on Comp. Sys. 1(3), 256-277 (1983)
    • (1983) ACM Trans. on Comp. Sys. , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 18
  • 27
    • 0024925378 scopus 로고
    • Finite-state noiseless covert channels
    • Millen, J.K.: Finite-State Noiseless Covert Channels. In: Proc. of the IEEE Computer Security Foundations Workshop, pp. 81-86 (1989) (Pubitemid 20616553)
    • (1989) Proc Comput Secur Found Workshop II , pp. 81-86
    • Millen Jonathan, K.1
  • 31
    • 38049169779 scopus 로고    scopus 로고
    • Noisy Timing Channels with Binary Inputs and Outputs
    • In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.). LNCS. Springer, Heidelberg
    • Martin, K., Moskowitz, I.S.: Noisy Timing Channels with Binary Inputs and Outputs. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.4437, pp. 124-144. Springer, Heidelberg (2007)
    • (2007) IH 2006 , vol.4437 , pp. 124-144
    • Martin, K.1    Moskowitz, I.S.2
  • 32
    • 33747336635 scopus 로고
    • The Channel Capacity of a Certain Noisy Timing Channel
    • Moskowitz, I.S., Miller, A.R.: The Channel Capacity of a Certain Noisy Timing Channel. IEEE Trans. on Information Theory 38(4), 1339-1344 (1992)
    • (1992) IEEE Trans. on Information Theory , vol.38 , Issue.4 , pp. 1339-1344
    • Moskowitz, I.S.1    Miller, A.R.2
  • 35
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • DOI 10.1109/TIT.2002.801405, PII 1011092002801405
    • Giles, J., Hajek, B.: An Information-theoretic and Game-theoretic Study of Timing Channels. IEEE Trans. on Information Theory 48(9), 2455-2477 (2002) (Pubitemid 35032673)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 37
    • 35048838158 scopus 로고    scopus 로고
    • An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth
    • Computer Safety, Reliability, and Security
    • Aldini, A., Bernardo, M.: An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol.3219, pp. 283-296. Springer, Heidelberg (2004) (Pubitemid 39289762)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.3219 , pp. 283-296
    • Aldini, A.1    Bernardo, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.