메뉴 건너뛰기




Volumn 21, Issue 9, 2010, Pages 2262-2288

Covert channel research

Author keywords

Covert channel; Covert channel auditing; Covert channel detection; Covert channel elimination; Covert channel identification; Covert channel limitation; Covert channel measurement

Indexed keywords

CLASSIC TECHNIQUES; COMMUNICATION CHANNEL; COVERT CHANNELS; OPERATION SYSTEM; RESEARCH DIRECTIONS; SECURE DATABASE; SECURE NETWORKS; SECURITY POLICY; TRANSFER INFORMATION;

EID: 77957969195     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2010.03880     Document Type: Article
Times cited : (38)

References (95)
  • 1
    • 0003969633 scopus 로고
    • Trusted computer system evaluation criteria
    • U.S. Department of Defense. DoD 5200.28-STD
    • U.S. Department of Defense. Trusted computer system evaluation criteria. DoD 5200.28-STD, 1985.
    • (1985)
  • 2
    • 77957969551 scopus 로고    scopus 로고
    • Classified oriteria for security protection of computer information system
    • GB 17859-1999, in Chinese
    • GB 17859-1999. Classified oriteria for security protection of computer information system. 2001 (in Chinese).
    • (2001)
  • 3
    • 0011326587 scopus 로고    scopus 로고
    • Information technology-security techniques-evaluation criteria for IT security
    • ISO/IEC 15408
    • ISO/IEC 15408. Information technology-security techniques-evaluation criteria for IT security. 1999.
    • (1999)
  • 4
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson BW. A note on the confinement problem. Communications of the ACM, 1973, 16(10): 613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 5
    • 84945721946 scopus 로고
    • A comment on the confinement problem
    • doi:10.1145/1067629.806537
    • Lipner SB. A comment on the confinement problem. Operating Systems Review, 1975, 9(5): 192-196. [doi:10.1145/1067629.806537]
    • (1975) Operating Systems Review , vol.9 , Issue.5 , pp. 192-196
    • Lipner, S.B.1
  • 6
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • Simmons GJ. The prisoners' problem and the subliminal channel. In: Proc. of the CRYPTO'83-Advances in Cryptology. 1984. 51-67. http://www.cs.nccu.edu.tw/~raylin/ ⋯/Spring2009/ThePrisonerProblem.pdf
    • (1984) Proc. of the CRYPTO'83-Advances in Cryptology , pp. 51-67
    • Simmons, G.J.1
  • 7
    • 0010512569 scopus 로고
    • A guide to understanding covert channel analysis of trusted systems
    • National Computer Security Center, NCSC-TG-30
    • National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. NCSC-TG-30, 1993.
    • (1993)
  • 8
    • 0023169573 scopus 로고
    • A formal method for the identification of covert storage channels in source code
    • Tsai CR, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code. In: Proc. of the IEEE Symp. on Security and Privacy. 1987. 74-87. http://www.computer.org/portal/web/csdl/doi/10.1109/SP.1987.10014
    • (1987) Proc. of the IEEE Symp. on Security and Privacy , pp. 74-87
    • Tsai, C.R.1    Gligor, V.D.2    Chandersekaran, C.S.3
  • 9
    • 12344282545 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Hanscom AFB, Bedford, FSD-TR-73-278, ESD/AFSC
    • Bell DE, Lapadula LJ. Secure computer systems: Mathematical foundations. Vol.1: Hanscom AFB, Bedford, FSD-TR-73-278, ESD/AFSC, 1973. 1-33.
    • (1973) , vol.1 , pp. 1-33
    • Bell, D.E.1    Lapadula, L.J.2
  • 10
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • doi: 10.1145/357369.357374
    • Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer System, 1983, 1(3): 256-277. [doi: 10.1145/357369.357374]
    • (1983) ACM Trans. on Computer System , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 11
    • 67649823284 scopus 로고    scopus 로고
    • A formal framework for real-time information flow analysis
    • Joon S, Jim AF. A formal framework for real-time information flow analysis. Computers and Security, 2009, 28(6): 421-432.
    • (2009) Computers and Security , vol.28 , Issue.6 , pp. 421-432
    • Joon, S.1    Jim, A.F.2
  • 12
    • 77957968081 scopus 로고    scopus 로고
    • Research on covert channel analysis and related techniques in secure database system
    • Ph.D. Thesis. Harbin: Harbin Engineering University, in Chinese
    • Cui BG. Research on covert channel analysis and related techniques in secure database system [Ph.D. Thesis]. Harbin: Harbin Engineering University, 2006 (in Chinese with English abstract).
    • (2006)
    • Cui, B.G.1
  • 13
    • 0024122416 scopus 로고
    • Implications of multilevel systems on the data dictionary of a secure relational DBMS
    • Jensen NR. Implications of multilevel systems on the data dictionary of a secure relational DBMS. In: Proc. of the 4th Aerospace Computer Security Applications Conf. 1988. 58-65. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=113418
    • (1988) Proc. of the 4th Aerospace Computer Security Applications Conf , pp. 58-65
    • Jensen, N.R.1
  • 14
    • 27244432044 scopus 로고    scopus 로고
    • A generic audit policy model on multilevel secure DBMS
    • in Chinese, doi: 10.1360/jos161774
    • He YZ, Li L, Feng DG. A generic audit policy model on multilevel secure DBMS. Journal of Software, 2005, 16(10): 1774-1783 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/1774.htm [doi: 10.1360/jos161774]
    • (2005) Journal of Software , vol.16 , Issue.10 , pp. 1774-1783
    • He, Y.Z.1    Li, L.2    Feng, D.G.3
  • 15
    • 0034313810 scopus 로고    scopus 로고
    • Integrating security and real-time requirements using covert channel capacity
    • doi: 10.1109/69.895799
    • Son SH, Mukkamala R, David R. Integrating security and real-time requirements using covert channel capacity. IEEE Trans. on Knowledge and Data Engineering, 2000, 12(6): 865-879. [doi: 10.1109/69.895799]
    • (2000) IEEE Trans. on Knowledge and Data Engineering , vol.12 , Issue.6 , pp. 865-879
    • Son, S.H.1    Mukkamala, R.2    David, R.3
  • 16
    • 0027848097 scopus 로고
    • Database concurrency control in multilevel secure database management systems
    • doi: 10.1109/69.250090
    • Keefe TF, Tsai WT, Srivastava J. Database concurrency control in multilevel secure database management systems. IEEE Trans. on Knowledge and Data Engineering, 1993, 5(6): 1039-1055. [doi: 10.1109/69.250090]
    • (1993) IEEE Trans. on Knowledge and Data Engineering , vol.5 , Issue.6 , pp. 1039-1055
    • Keefe, T.F.1    Tsai, W.T.2    Srivastava, J.3
  • 17
    • 77957942263 scopus 로고    scopus 로고
    • Study on subliminal channels
    • Ph.D. Thesis. Xi'an: Xidian University, in Chinese
    • Dong QK. Study on subliminal channels [Ph.D. Thesis]. Xi'an: Xidian University, 2003 (in Chinese with English abstract).
    • (2003)
    • Dong, Q.K.1
  • 18
    • 77957964823 scopus 로고    scopus 로고
    • Study on covert channel analyhsis in high-level secure operating system
    • Ph.D. Thesis. Beijing: Graduate School, the Chinese Academy of Sciences, in Chinese
    • Zhu JF. Study on covert channel analyhsis in high-level secure operating system [Ph.D. Thesis]. Beijing: Graduate School, the Chinese Academy of Sciences, 2006 (in Chinese with English abstract).
    • (2006)
    • Zhu, J.F.1
  • 19
    • 0023294988 scopus 로고
    • Covert channels in LAN's
    • doi: 10.1109/TSE.1987.233153
    • Girling CG. Covert channels in LAN's. IEEE Trans. on Software Engineering, 1987, SE-13(2): 292-296. [doi: 10.1109/TSE.1987.233153]
    • (1987) IEEE Trans. on Software Engineering , vol.SE-13 , Issue.2 , pp. 292-296
    • Girling, C.G.1
  • 20
    • 33746069919 scopus 로고    scopus 로고
    • Hiding data in the OSI network model
    • Handel TG, Sandford MT. Hiding data in the OSI network model. Information Hiding, 1996, 1174: 23-38.
    • (1996) Information Hiding , vol.1174 , pp. 23-38
    • Handel, T.G.1    Sandford, M.T.2
  • 22
    • 56549128365 scopus 로고    scopus 로고
    • Model-Based covert timing channels: Automated modeling and evasion
    • doi: 10.1007/978-3-540-87403-4_12
    • Gianvecchio S, Wang H, Wijesekera D, Jajodia S. Model-Based covert timing channels: Automated modeling and evasion. Recent Advances in Intrusion Detection, 2008, 5230: 211-230. [doi: 10.1007/978-3-540-87403-4_12]
    • (2008) Recent Advances in Intrusion Detection , vol.5230 , pp. 211-230
    • Gianvecchio, S.1    Wang, H.2    Wijesekera, D.3    Jajodia, S.4
  • 24
    • 79958234122 scopus 로고    scopus 로고
    • Covert channels and countermeasures in computer network protocols
    • doi: 10.1109/MCOM.2007.4395378
    • Zander S, Armitage G, Branch P. Covert channels and countermeasures in computer network protocols. IEEE Communications Magazine, 2007, 45(12): 136-142. [doi: 10.1109/MCOM.2007.4395378]
    • (2007) IEEE Communications Magazine , vol.45 , Issue.12 , pp. 136-142
    • Zander, S.1    Armitage, G.2    Branch, P.3
  • 28
    • 38049087058 scopus 로고    scopus 로고
    • Detection of covert channel encoding in network packet delays
    • Technical Report, TR2005536, Department of Computer Science, Dartmouth College
    • Berk V, Giani A, Cybenko G. Detection of covert channel encoding in network packet delays. Technical Report, TR2005536, Department of Computer Science, Dartmouth College, 2005. 1-11.
    • (2005) , pp. 1-11
    • Berk, V.1    Giani, A.2    Cybenko, G.3
  • 30
    • 0027208502 scopus 로고
    • Detection and elimination of inference channels in multilevel relational database systems
    • Oakland
    • Qian XL, Stickel ME, Karp PD, Lunt TF, Garvey TD. Detection and elimination of inference channels in multilevel relational database systems. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland, 1993. 196-205. http://www.computer.org/portal/ web/csdl/doi/10.1109/RISP.1993.287632
    • (1993) Proc. of the IEEE Symp. on Security and Privacy , pp. 196-205
    • Qian, X.L.1    Stickel, M.E.2    Karp, P.D.3    Lunt, T.F.4    Garvey, T.D.5
  • 31
    • 0032641890 scopus 로고    scopus 로고
    • 20 years of covert channel modeling and analysis
    • Oakland
    • Millen J. 20 years of covert channel modeling and analysis. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland, 1999. 113-114. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=766906
    • (1999) Proc. of the IEEE Symp. on Security and Privacy , pp. 113-114
    • Millen, J.1
  • 32
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • doi: 10.1145/ 360051.360056
    • Denning DE. A lattice model of secure information flow. Communications of the ACM, 1976, 19(5): 236-243. [doi: 10.1145/ 360051.360056]
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 35
    • 0028064126 scopus 로고
    • Eliminating formal flows in automated information flow analysis
    • Eckmann ST. Eliminating formal flows in automated information flow analysis. In: Proc. of the IEEE Symp. on Security and Privacy. 1994. 30-38. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=296594
    • (1994) Proc. of the IEEE Symp. on Security and Privacy , pp. 30-38
    • Eckmann, S.T.1
  • 38
    • 0023292228 scopus 로고
    • An experience using two covert channel analysis techniques on a real system design
    • doi: 10.1109/TSE.1987.226479
    • Haigh JT, Kemmerer RA, Mchugh J, Young WD. An experience using two covert channel analysis techniques on a real system design. IEEE Trans. on Software Engineering, 1987, 13(2): 157-168. [doi: 10.1109/TSE.1987.226479]
    • (1987) IEEE Trans. on Software Engineering , vol.13 , Issue.2 , pp. 157-168
    • Haigh, J.T.1    Kemmerer, R.A.2    Mchugh, J.3    Young, W.D.4
  • 39
    • 8644270771 scopus 로고    scopus 로고
    • Covert channel analysis: A chapter of the handbook for the computer security certification of trusted systems
    • Department of Computer Science, Portland State University
    • Mchugh J. Covert channel analysis: A chapter of the handbook for the computer security certification of trusted systems. Department of Computer Science, Portland State University, 1996. 1-78. http://chacsnrlnavymil/publications/handbook
    • (1996) , pp. 1-78
    • Mchugh, J.1
  • 40
    • 0026260664 scopus 로고
    • Covert flow trees: A visual approach to analyzing covert storage channels
    • doi: 10.1109/32.106972
    • Kemmerer RA, Porras PA. Covert flow trees: A visual approach to analyzing covert storage channels. IEEE Trans. on Software Engineering, 1991, 17(11): 1166-1185. [doi: 10.1109/32.106972]
    • (1991) IEEE Trans. on Software Engineering , vol.17 , Issue.11 , pp. 1166-1185
    • Kemmerer, R.A.1    Porras, P.A.2
  • 41
    • 33646822696 scopus 로고
    • Covert channel analysis in secure computer systems
    • Ph.D. Thesis. Maryland: University of Maryland-College Park (MD)
    • Tsai CR. Covert channel analysis in secure computer systems [Ph.D. Thesis]. Maryland: University of Maryland-College Park (MD), 1987.
    • (1987)
    • Tsai, C.R.1
  • 42
    • 0025438147 scopus 로고
    • On the identification of covert storage channels in secure systems
    • doi: 10.1109/32.55086
    • Tsai CR, Gligor VD, Chandersekaran CS. On the identification of covert storage channels in secure systems. IEEE Trans. on Software Engineering, 1990, 16(6): 569-580. [doi: 10.1109/32.55086]
    • (1990) IEEE Trans. on Software Engineering , vol.16 , Issue.6 , pp. 569-580
    • Tsai, C.R.1    Gligor, V.D.2    Chandersekaran, C.S.3
  • 43
    • 77957937935 scopus 로고    scopus 로고
    • Research on information flow technologies and security architecture of secure operating system
    • Ph.D. Thesis. Beijing: Graduate University, the Chinese Academy of Sciences, in Chinese
    • Shen JJ. Research on information flow technologies and security architecture of secure operating system [Ph.D. Thesis]. Beijing: Graduate University, the Chinese Academy of Sciences, 2008 (in Chinese with English abstract).
    • (2008)
    • Shen, J.J.1
  • 44
    • 0023855640 scopus 로고
    • A bandwidth computation model for covert storage channels and its applications
    • Tsai CR, Gligor VD. A bandwidth computation model for covert storage channels and its applications. In: Proc. of the IEEE Symp. on Security and Privacy. 1988. 108-121. http://www.computer.org/portal/web/csdl/doi/10.1109/SECPRI.1988.8103
    • (1988) Proc. of the IEEE Symp. on Security and Privacy , pp. 108-121
    • Tsai, C.R.1    Gligor, V.D.2
  • 46
    • 14844349298 scopus 로고    scopus 로고
    • Bounds on the capacity of the unidirectional channels
    • doi: 10.1109/TC.2005.18
    • Tallini LG. Bounds on the capacity of the unidirectional channels. IEEE Trans. on Computers, 2005, 54(2): 232-235. [doi: 10.1109/TC.2005.18]
    • (2005) IEEE Trans. on Computers , vol.54 , Issue.2 , pp. 232-235
    • Tallini, L.G.1
  • 48
    • 0028566761 scopus 로고
    • Covert channels-Here to stay
    • Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security
    • Moskowitz IS, Kang MH. Covert channels-Here to stay? In: Proc. of the 9th Annual Conf. on Computer Assurance (COMPASS 1994) 'Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security'. 1994. 235-243. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=318449
    • (1994) Proc. of the 9th Annual Conf. on Computer Assurance (COMPASS 1994) , pp. 235-243
    • Moskowitz, I.S.1    Kang, M.H.2
  • 49
    • 65349144517 scopus 로고    scopus 로고
    • New definition of small message criterion and its application in transaction covert channel mitigating
    • in Chinese, doi: 10.3724/SP.J.1001.2009.03246
    • Zeng HT, Wang YJ, Zu W, Cai JY, Ruan L. New definition of small message criterion and its application in transaction covert channel mitigating. Journal of Software, 2009, 20(4): 985-996 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3246.htm [doi: 10.3724/SP.J.1001.2009.03246]
    • (2009) Journal of Software , vol.20 , Issue.4 , pp. 985-996
    • Zeng, H.T.1    Wang, Y.J.2    Zu, W.3    Cai, J.Y.4    Ruan, L.5
  • 50
    • 0036494997 scopus 로고    scopus 로고
    • Maintaining security and timeliness in real-time database system
    • doi: 10.1016/S0164-1212(01)00111-X
    • Ahmed QN, Vrbsky SV. Maintaining security and timeliness in real-time database system. Journal of Systems and Software, 2002, 61(1): 15-29. [doi: 10.1016/S0164-1212(01)00111-X]
    • (2002) Journal of Systems and Software , vol.61 , Issue.1 , pp. 15-29
    • Ahmed, Q.N.1    Vrbsky, S.V.2
  • 51
    • 33845924790 scopus 로고    scopus 로고
    • Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems
    • Joon S, Jim AF. Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems. In: Proc. of the IEEE Workshop on Information Assurance United States Military Academy. 2006. 361-368. http://ieeexplore.ieee.org/xpl/ freeabs_all.jsp?arnumber=1652117
    • (2006) Proc. of the IEEE Workshop on Information Assurance United States Military Academy , pp. 361-368
    • Joon, S.1    Jim, A.F.2
  • 53
    • 0027307382 scopus 로고
    • On introducing noise into the bus-contention channel
    • Oakland
    • Gray JW. On introducing noise into the bus-contention channel. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland, 1993. 90-98. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=287640
    • (1993) Proc. of the IEEE Symp. on Security and Privacy , pp. 90-98
    • Gray, J.W.1
  • 55
    • 12844265899 scopus 로고    scopus 로고
    • Covert channel analysis in secure operating systems with high security levels
    • in Chinese
    • Qing SH. Covert channel analysis in secure operating systems with high security levels. Journal of Software, 2004, 15(12): 1837-1849 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1837.htm
    • (2004) Journal of Software , vol.15 , Issue.12 , pp. 1837-1849
    • Qing, S.H.1
  • 56
    • 0025641510 scopus 로고
    • Information-Flow analysis for covert-channel identification in multilevel secure operating systems
    • He JS, Gligor VD. Information-Flow analysis for covert-channel identification in multilevel secure operating systems. In: Proc. of the Computer Security Foundations Workshop III. 1990. 139-148. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=128194
    • (1990) Proc. of the Computer Security Foundations Workshop III , pp. 139-148
    • He, J.S.1    Gligor, V.D.2
  • 57
    • 33749458217 scopus 로고    scopus 로고
    • A state-based approach to information flow analysis
    • in Chinese
    • Zi XC, Yao LH, Li L. A state-based approach to information flow analysis. Chinese Journal of Computers, 2006, 29(8): 1460-1467 (in Chinese with English abstract).
    • (2006) Chinese Journal of Computers , vol.29 , Issue.8 , pp. 1460-1467
    • Zi, X.C.1    Yao, L.H.2    Li, L.3
  • 58
    • 8644251330 scopus 로고    scopus 로고
    • Covet channel analysis on ANSHENG secure operating system
    • in Chinese
    • Qing SH, Zhu JF. Covet channel analysis on ANSHENG secure operating system. Journal of Software, 2004, 15(9): 1385-1392 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1385.htm
    • (2004) Journal of Software , vol.15 , Issue.9 , pp. 1385-1392
    • Qing, S.H.1    Zhu, J.F.2
  • 60
    • 0032714529 scopus 로고    scopus 로고
    • Estimating and measuring covert channel bandwidth in multilevel secure operating systems
    • Shieh SP. Estimating and measuring covert channel bandwidth in multilevel secure operating systems. Journal of Information Science and Engineering, 1999, 15(1): 91-106.
    • (1999) Journal of Information Science and Engineering , vol.15 , Issue.1 , pp. 91-106
    • Shieh, S.P.1
  • 62
    • 33747336635 scopus 로고
    • The channel capacity of a certain noisy timing channel
    • doi: 10.1109/18.144712
    • Moskowitz IS, Miller AR. The channel capacity of a certain noisy timing channel. IEEE Trans. on Information Theory, 1992, 38(4): 1339-1344. [doi: 10.1109/18.144712]
    • (1992) IEEE Trans. on Information Theory , vol.38 , Issue.4 , pp. 1339-1344
    • Moskowitz, I.S.1    Miller, A.R.2
  • 65
    • 33645958853 scopus 로고    scopus 로고
    • New constructive approach to covert channel modeling and channel capacity estimation
    • Wang ZH, Lee RB. New constructive approach to covert channel modeling and channel capacity estimation. In: Proc. of the 8th Information Security Conf. 2005. 498-505. http://palms.ee.princeton.edu/PALMSopen/ISC05_w_cit.pdf
    • (2005) Proc. of the 8th Information Security Conf , pp. 498-505
    • Wang, Z.H.1    Lee, R.B.2
  • 67
    • 84974687699 scopus 로고
    • Scheduling algorithms for multiprogramming in a hard-real-time environment
    • Liu CL, Layland JW. Scheduling algorithms for multiprogramming in a hard-real-time environment. Journal of the Association for Computing Machinery, 1973, 20(1): 46-61.
    • (1973) Journal of the Association for Computing Machinery , vol.20 , Issue.1 , pp. 46-61
    • Liu, C.L.1    Layland, J.W.2
  • 68
    • 4043111268 scopus 로고    scopus 로고
    • On schedulability test of rate monotonic and its extendible algorithms
    • in Chinese
    • Wang YJ, Chen QP. On schedulability test of rate monotonic and its extendible algorithms. Journal of Software, 2004, 15(6): 799-814 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/799.htm
    • (2004) Journal of Software , vol.15 , Issue.6 , pp. 799-814
    • Wang, Y.J.1    Chen, Q.P.2
  • 69
    • 77957960630 scopus 로고    scopus 로고
    • Research on covert channel measurement and handling in secure real-time database
    • Ph.D. Thesis. Beijing: Graduate University, the Chinese Academy of Sciences, in Chinese
    • Zeng HT. Research on covert channel measurement and handling in secure real-time database [Ph.D. Thesis]. Beijing: Graduate University, the Chinese Academy of Sciences, 2008 (in Chinese with English abstract).
    • (2008)
    • Zeng, H.T.1
  • 71
    • 0033878717 scopus 로고    scopus 로고
    • Secure concurrency control in firm real-time database systems
    • doi: 10.1023/A: 1008783216944
    • George B, Haritsa JR. Secure concurrency control in firm real-time database systems. Distributed and Parallel Databases, 2000, 8(1): 41-83. [doi: 10.1023/A: 1008783216944]
    • (2000) Distributed and Parallel Databases , vol.8 , Issue.1 , pp. 41-83
    • George, B.1    Haritsa, J.R.2
  • 76
    • 0006313369 scopus 로고    scopus 로고
    • Improving timeliness in real-time secure database systems
    • Son SH, David R, Thuraisingham B. Improving timeliness in real-time secure database systems. SIGMOD Record, 1996, 25(1): 29-33.
    • (1996) SIGMOD Record , vol.25 , Issue.1 , pp. 29-33
    • Son, S.H.1    David, R.2    Thuraisingham, B.3
  • 77
    • 51649119359 scopus 로고    scopus 로고
    • Covert channel mitigation method for secure real-time database using capacity metric
    • in Chinese
    • Zeng HT, Wang YJ, Ruan L, Zu W, Cai JY. Covert channel mitigation method for secure real-time database using capacity metric. Journal on Communications, 2008, 20(8): 46-56 (in Chinese with English abstract).
    • (2008) Journal on Communications , vol.20 , Issue.8 , pp. 46-56
    • Zeng, H.T.1    Wang, Y.J.2    Ruan, L.3    Zu, W.4    Cai, J.Y.5
  • 78
    • 44449169384 scopus 로고    scopus 로고
    • Integrated criteria for covert channel auditing
    • doi: 10.1631/jzus.A071510
    • Wang CD, Ju SG. Integrated criteria for covert channel auditing. Journal of Zhejiang University-Science A, 2008, 9(6): 737-743. [doi: 10.1631/jzus.A071510]
    • (2008) Journal of Zhejiang University-Science A , vol.9 , Issue.6 , pp. 737-743
    • Wang, C.D.1    Ju, S.G.2
  • 79
    • 2642534513 scopus 로고    scopus 로고
    • Practical data hiding in TCP/IP
    • Multimedia Security
    • Ahsan K, Kundur D. Practical data hiding in TCP/IP. In: Proc. of the ACM Wksp. Multimedia Security, 2002. 1-8.
    • (2002) Proc. of the ACM Wksp , pp. 1-8
    • Ahsan, K.1    Kundur, D.2
  • 81
    • 60349097643 scopus 로고    scopus 로고
    • Application layer covert channel analysis and detection
    • Edinburgh: Napier University
    • Kwecka Z. Application layer covert channel analysis and detection. Edinburgh: Napier University, 2006. http://www.buchananweb.co.uk/zk.pdf
    • (2006)
    • Kwecka, Z.1
  • 84
    • 77957969118 scopus 로고    scopus 로고
    • An exploit-specific monitor to prevent malicious communication channel
    • Technical Report, GIT-CERCS-04-28, Georgia Institute of Technology
    • Eraser SA. An exploit-specific monitor to prevent malicious communication channel. Technical Report, GIT-CERCS-04-28, Georgia Institute of Technology, 2004. 1-12.
    • (2004) , pp. 1-12
    • Eraser, S.A.1
  • 85
    • 33746584368 scopus 로고    scopus 로고
    • Embedding covert channels into TCP/IP
    • Murdoch SJ, Lewis S. Embedding covert channels into TCP/IP. In: Proc. of the Information Hiding. 2005. 247-261. http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf
    • (2005) Proc. of the Information Hiding , pp. 247-261
    • Murdoch, S.J.1    Lewis, S.2
  • 87
    • 0142187791 scopus 로고    scopus 로고
    • A study on the covert channel detection of TCP/IP header using support vector machine
    • DOI:10.1007/978-3-540-39927-8_29
    • Sohn T, Seo JT, Moon J. A study on the covert channel detection of TCP/IP header using support vector machine. Information and Communications Security, 2003, 2836: 313-324. [DOI:10.1007/978-3-540-39927-8_29]
    • (2003) Information and Communications Security , vol.2836 , pp. 313-324
    • Sohn, T.1    Seo, J.T.2    Moon, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.