-
1
-
-
35048834771
-
Comparing countermeasures against interrupt-related covert channels in an information-theoretic framework
-
DOI 10.1109/CSF.2007.14, 4271658, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
-
Mantel, H., Sudbrock, H.: Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. In: Proc. of the IEEE Computer Security Foundations Symposium, pp. 326-340 (2007) (Pubitemid 47554223)
-
(2007)
Proceedings - IEEE Computer Security Foundations Symposium
, pp. 326-340
-
-
Mantel, H.1
Sudbrock, H.2
-
2
-
-
0015672289
-
A Note on the Confinement Problem
-
Lampson, B.W.: A Note on the Confinement Problem. Communications of the ACM 16(10), 613-615 (1973)
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
3
-
-
0010512569
-
A GuiDe to Understanding Covert Channel Analysis of Trusted Systems
-
Gligor, V.: A GuiDe to Understanding Covert Channel Analysis of Trusted Systems. CSCTG-030, Rainbow Series (Light Pink Book) (1993)
-
(1993)
CSCTG-030 Rainbow Series (Light Pink Book)
-
-
Gligor, V.1
-
4
-
-
0032714529
-
Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems
-
Shieh, S.P.: Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. Journal of Inform. Science & Engineering 15, 91-106 (1999)
-
(1999)
Journal of Inform. Science & Engineering
, vol.15
, pp. 91-106
-
-
Shieh, S.P.1
-
6
-
-
38049101307
-
Hiding Information in Multi Level Security Systems
-
In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.). LNCS. Springer, Heidelberg
-
Beauquier, D., Lanotte, R.: Hiding Information in Multi Level Security Systems. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.4691, pp. 250-269. Springer, Heidelberg (2007)
-
(2007)
FAST 2006
, vol.4691
, pp. 250-269
-
-
Beauquier, D.1
Lanotte, R.2
-
7
-
-
33845924790
-
Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems
-
1652117, Proceedings of the 2006 IEEE Workshop on Information Assurance
-
Son, J., Alves-Foss, J.: Covert Timing Channel Analysis of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems. In: Proc. of the IEEE Information Assurance Workshop, pp. 361-368 (2006) (Pubitemid 46028779)
-
(2006)
Proceedings of the 2006 IEEE Workshop on Information Assurance
, vol.2006
, pp. 361-368
-
-
Son, J.1
Alves-Foss, J.2
-
8
-
-
84889281816
-
-
John Wiley & Sons, Inc., Chichester
-
Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. John Wiley & Sons, Inc., Chichester (2006)
-
(2006)
Elements of Information Theory, 2nd edn.
-
-
Cover, T.M.1
Thomas, J.A.2
-
9
-
-
0015287895
-
An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels
-
Arimoto, S.: An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels. IEEE Trans. on Information Theory 18(1), 14-20 (1972)
-
(1972)
IEEE Trans. on Information Theory
, vol.18
, Issue.1
, pp. 14-20
-
-
Arimoto, S.1
-
10
-
-
0015376113
-
Computation of Channel Capacity and Rate-Distortion Functions
-
Blahut, R.: Computation of Channel Capacity and Rate-Distortion Functions. IEEE Trans. on Information Theory 18(4), 460-473 (1972)
-
(1972)
IEEE Trans. on Information Theory
, vol.18
, Issue.4
, pp. 460-473
-
-
Blahut, R.1
-
11
-
-
67650664425
-
Interrupt Moderation Using Intel Gigabit Ethernet Controllers
-
Revision 1.1
-
Intel Corporation: Interrupt Moderation Using Intel Gigabit Ethernet Controllers, Application Note (AP-450), Revision 1.1 (2003)
-
(2003)
Application Note (AP-450)
-
-
Intel Corporation1
-
13
-
-
0002407118
-
On the Global Minimization of Concave Functions
-
Horst, R.: On the Global Minimization of Concave Functions. OR Spectrum 6(4), 195-205 (1984)
-
(1984)
OR Spectrum
, vol.6
, Issue.4
, pp. 195-205
-
-
Horst, R.1
-
14
-
-
0030242902
-
Deterministic algorithms for constrained concave minimization: A unified critical survey
-
Benson, H.P.: Deterministic Algorithms for Constrained Concave Minimization: A Unified Critical Survey. Naval Research Logistics 43(6), 765-795 (1996) (Pubitemid 126579380)
-
(1996)
Naval Research Logistics
, vol.43
, Issue.6
, pp. 765-795
-
-
Benson, H.P.1
-
15
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236-243 (1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
16
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
Denning, D.E., Denning, P.J.: Certification of Programs for Secure Information Flow. Communications of the ACM 20(7), 504-513 (1977)
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
17
-
-
84976667065
-
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
-
Kemmerer, R.A.: Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Trans. on Comp. Sys. 1(3), 256-277 (1983)
-
(1983)
ACM Trans. on Comp. Sys.
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
18
-
-
84948947266
-
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
-
Kemmerer, R.A.: A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. In: Proc. of the Annual Computer Security Applications Conference, pp. 109-118 (2002)
-
(2002)
Proc. of the Annual Computer Security Applications Conference
, pp. 109-118
-
-
Kemmerer, R.A.1
-
19
-
-
0001905093
-
A Sound Type System for Secure Flow Analysis
-
Volpano, D., Smith, G., Irvine, C.: A Sound Type System for Secure Flow Analysis. Journal of Computer Security 4(3), 1-21 (1996)
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 1-21
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
23
-
-
0027719713
-
A Pump for Rapid, Reliable, Secure Communication
-
Kang, M.H.,Moskowitz, I.S.: A Pump for Rapid, Reliable, Secure Communication. In: Proc. of the ACM Conference on Computer and Communications Security, pp. 119-129 (1993)
-
(1993)
Proc. of the ACM Conference on Computer and Communications Security
, pp. 119-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
24
-
-
33846329830
-
The pump: A decade of covert fun
-
DOI 10.1109/CSAC.2005.56, 1565262, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
Kang, M.H., Moskowitz, I.S., Chincheck, S.: The Pump: A DecaDe of Covert Fun. In: Proc. of the Annual Computer Security Applications Conference, pp. 352-360 (2005) (Pubitemid 46116491)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 352-358
-
-
Kang, M.H.1
Moskowitz, I.S.2
Chincheck, S.3
-
27
-
-
0024925378
-
Finite-state noiseless covert channels
-
Millen, J.K.: Finite-State Noiseless Covert Channels. In: Proc. of the IEEE Computer Security Foundations Workshop, pp. 81-86 (1989) (Pubitemid 20616553)
-
(1989)
Proc Comput Secur Found Workshop II
, pp. 81-86
-
-
Millen Jonathan, K.1
-
30
-
-
0032201972
-
An analysis of the timed Z-channel
-
PII S0018944898073647
-
Moskowitz, I.S., Greenwald, S.J., Kang, M.H.: An Analysis of the Timed Z-channel. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 2-11 (1996) (Pubitemid 128740021)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.7
, pp. 3162-3168
-
-
Moskowitz, I.S.1
Greenwald, S.J.2
Kang, M.H.3
-
31
-
-
38049169779
-
Noisy Timing Channels with Binary Inputs and Outputs
-
In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.). LNCS. Springer, Heidelberg
-
Martin, K., Moskowitz, I.S.: Noisy Timing Channels with Binary Inputs and Outputs. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.4437, pp. 124-144. Springer, Heidelberg (2007)
-
(2007)
IH 2006
, vol.4437
, pp. 124-144
-
-
Martin, K.1
Moskowitz, I.S.2
-
32
-
-
33747336635
-
The Channel Capacity of a Certain Noisy Timing Channel
-
Moskowitz, I.S., Miller, A.R.: The Channel Capacity of a Certain Noisy Timing Channel. IEEE Trans. on Information Theory 38(4), 1339-1344 (1992)
-
(1992)
IEEE Trans. on Information Theory
, vol.38
, Issue.4
, pp. 1339-1344
-
-
Moskowitz, I.S.1
Miller, A.R.2
-
34
-
-
0000446356
-
A network pump
-
Kang, M.H., Moskowitz, I.S., Lee, D.C.: A Network Pump. IEEE Trans. on Software Engineering 22(5), 329-338 (1996) (Pubitemid 126771674)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 329-338
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
35
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
DOI 10.1109/TIT.2002.801405, PII 1011092002801405
-
Giles, J., Hajek, B.: An Information-theoretic and Game-theoretic Study of Timing Channels. IEEE Trans. on Information Theory 48(9), 2455-2477 (2002) (Pubitemid 35032673)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
36
-
-
18944373905
-
Automatic Analysis of the NRL Pump
-
Lanotte, R., Maggiolo-Schettini, A., Tini, S., Troina, A., Tronci, E.: Automatic Analysis of the NRL Pump. Electr. Notes Theor. Comput. Sci. 99, 245-266 (2004)
-
(2004)
Electr. Notes Theor. Comput. Sci.
, vol.99
, pp. 245-266
-
-
Lanotte, R.1
Maggiolo-Schettini, A.2
Tini, S.3
Troina, A.4
Tronci, E.5
-
37
-
-
35048838158
-
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth
-
Computer Safety, Reliability, and Security
-
Aldini, A., Bernardo, M.: An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol.3219, pp. 283-296. Springer, Heidelberg (2004) (Pubitemid 39289762)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.3219
, pp. 283-296
-
-
Aldini, A.1
Bernardo, M.2
|