메뉴 건너뛰기




Volumn , Issue , 2011, Pages 98-107

A practical covert channel identification approach in source code based on directed information flow graph

Author keywords

Alias analysis; Covert channel identification; Directed information flow graph; Modularized analysis; Prune algorithm; Source code analysis

Indexed keywords

ALIAS ANALYSIS; COVERT CHANNELS; DIRECTED INFORMATION; MODULARIZED; SOURCE CODE ANALYSIS;

EID: 80052931252     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SSIRI.2011.17     Document Type: Conference Paper
Times cited : (9)

References (34)
  • 1
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson, "A note on the confinement problem, " Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 6
    • 77957969195 scopus 로고    scopus 로고
    • Covert channel research
    • Y. Wang, J. Wu, L. Ding, and X. Liao, "Covert channel research, " Journal of Software, vol. 21, no. 9, pp. 2262-2288, 2010.
    • (2010) Journal of Software , vol.21 , Issue.9 , pp. 2262-2288
    • Wang, Y.1    Wu, J.2    Ding, L.3    Liao, X.4
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning, "A lattice model of secure information flow, " Commun. ACM, vol. 19, no. 5, pp. 236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 0025438147 scopus 로고
    • On the identification of covert storage channels in secure systems
    • C.-R. Tsai, V. D. Gligor, and C. S. Chandersekaran, "On the identification of covert storage channels in secure systems, " IEEE Trans. Software Eng., vol. 16, no. 6, pp. 569-580, 1990.
    • (1990) IEEE Trans. Software Eng , vol.16 , Issue.6 , pp. 569-580
    • Tsai, C.-R.1    Gligor, V.D.2    Chandersekaran, C.S.3
  • 9
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • R. A. Kemmerer, "Shared resource matrix methodology: An approach to identifying storage and timing channels, " ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 256-277, 1983.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 10
    • 84948947266 scopus 로고    scopus 로고
    • A practical approach to identifying storage and timing channels: Twenty years later
    • R. A. Kemmerer, "A practical approach to identifying storage and timing channels: Twenty years later, " in ACSAC, 2002, pp. 109-118.
    • (2002) ACSAC , pp. 109-118
    • Kemmerer, R.A.1
  • 12
    • 33750931965 scopus 로고    scopus 로고
    • Run-time detection of covert channels
    • N. Nagatou and T. Watanabe, "Run-time detection of covert channels, " in ARES, 2006, pp. 577-584.
    • (2006) ARES , pp. 577-584
    • Nagatou, N.1    Watanabe, T.2
  • 13
    • 0023292228 scopus 로고
    • An experience using two covert channel analysis techniques on a real system design
    • J. T. Haigh, R. A. Kemmerer, J. McHugh, and W. D. Young, "An experience using two covert channel analysis techniques on a real system design, " IEEE Trans. Software Eng., vol. 13, no. 2, pp. 157-168, 1987.
    • (1987) IEEE Trans. Software Eng , vol.13 , Issue.2 , pp. 157-168
    • Haigh, J.T.1    Kemmerer, R.A.2    Mchugh, J.3    Young, W.D.4
  • 14
    • 0032641890 scopus 로고    scopus 로고
    • 20 years of covert channel modeling and analysis
    • J. K. Millen, "20 years of covert channel modeling and analysis, " in IEEE Symposium on Security and Privacy, 1999, pp. 113-114.
    • (1999) IEEE Symposium on Security and Privacy , pp. 113-114
    • Millen, J.K.1
  • 15
    • 0023294988 scopus 로고
    • Covert channels in LAN's
    • C. G. Girling, "Covert channels in LAN's, " IEEE Trans. Software Eng., vol. 13, no. 2, pp. 292-296, 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 292-296
    • Girling, C.G.1
  • 17
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols, " IEEE Communications Surveys and Tutorials, vol. 9, no. 1-4, pp. 44-57, 2007.
    • (2007) IEEE Communications Surveys and Tutorials , vol.9 , Issue.1-4 , pp. 44-57
    • Zander, S.1    Armitage, G.J.2    Branch, P.3
  • 18
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • L. Yao, X. Zi, L. Pan, and J. Li, "A study of on/off timing channel based on packet delay distribution, " Computers & Security, vol. 28, no. 8, pp. 785 - 794, 2009.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3    Li, J.4
  • 22
    • 77954737019 scopus 로고    scopus 로고
    • Load-based covert channels between xen virtual machines
    • K. Okamura and Y. Oyama, "Load-based covert channels between xen virtual machines, " in SAC, 2010, pp. 173-180.
    • (2010) SAC , pp. 173-180
    • Okamura, K.1    Oyama, Y.2
  • 24
    • 70349682314 scopus 로고    scopus 로고
    • TCP/IP timing channels: Theory to implementation
    • S. H. Sellke, C.-C. Wang, S. Bagchi, and N. B. Shroff, "TCP/IP timing channels: Theory to implementation, " in INFOCOM, 2009, pp. 2204-2212.
    • (2009) INFOCOM , pp. 2204-2212
    • Sellke, S.H.1    Wang, C.-C.2    Bagchi, S.3    Shroff, N.B.4
  • 26
    • 38049087058 scopus 로고    scopus 로고
    • Detection of covert channel encoding in network packet delays
    • de lUniversit́e de Dartmouth. Novembre
    • V. Berk, A. Giani, G. Cybenko, and N. Hanover, "Detection of covert channel encoding in network packet delays, " Rapport technique TR536, de lUniversit́e de Dartmouth. Novembre, 2005.
    • (2005) Rapport Technique TR536
    • Berk, V.1    Giani, A.2    Cybenko, G.3    Hanover, N.4
  • 27
    • 65349144517 scopus 로고    scopus 로고
    • New definition of small message criterion and its application in transaction covert channel mitigating
    • H. Zeng, Y. Wang, W. Zu, J. Cai, and L. Ruan, "New definition of small message criterion and its application in transaction covert channel mitigating, " Journal of Software, vol. 20, no. 4, pp. 985-996, 2009.
    • (2009) Journal of Software , vol.20 , Issue.4 , pp. 985-996
    • Zeng, H.1    Wang, Y.2    Zu, W.3    Cai, J.4    Ruan, L.5
  • 28
    • 67649823284 scopus 로고    scopus 로고
    • A formal framework for real-time information flow analysis
    • J. Son and J. Alves-Foss, "A formal framework for real-time information flow analysis, " Comput. Secur., vol. 28, no. 6, pp. 421-432, 2009.
    • (2009) Comput. Secur. , vol.28 , Issue.6 , pp. 421-432
    • Son, J.1    Alves-Foss, J.2
  • 29
    • 0026260664 scopus 로고
    • Covert flow trees: A visual approach to analyzing covert storage channels
    • R. A. Kemmerer and P. A. Porras, "Covert flow trees: A visual approach to analyzing covert storage channels, " IEEE Trans. Software Eng., vol. 17, no. 11, pp. 1166-1185, 1991.
    • (1991) IEEE Trans. Software Eng , vol.17 , Issue.11 , pp. 1166-1185
    • Kemmerer, R.A.1    Porras, P.A.2
  • 30
    • 33846272388 scopus 로고    scopus 로고
    • Looking back at the bell-la padula model
    • Tucson Arizona, USA, December
    • D. E. Bell, "Looking back at the bell-la padula model, " in Computer Security Applications Conference, 21st Annual, Tucson Arizona, USA, December 2005, pp. 337-351.
    • (2005) Computer Security Applications Conference, 21st Annual , pp. 337-351
    • Bell, D.E.1
  • 31
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • April, Bedford, MA
    • K. J. Biba, "Integrity considerations for secure computer systems, " The MITRE Corporation, Bedford, MA, Tech. Rep. MTR-3153, April, 1977.
    • (1977) The MITRE Corporation, Tech. Rep. MTR-3153
    • Biba, K.J.1
  • 32
    • 85061200460 scopus 로고    scopus 로고
    • A modular covert channel analysis methodology for trusted DG/UXTM
    • R. A. Kemmerer and T. Taylor, "A modular covert channel analysis methodology for trusted DG/UXTM, " in ACSAC, 1996, pp. 224-235.
    • (1996) ACSAC , pp. 224-235
    • Kemmerer, R.A.1    Taylor, T.2
  • 33
    • 0035153588 scopus 로고    scopus 로고
    • Evaluating the effectiveness of pointer alias analyses
    • M. Hind and A. Pioli, "Evaluating the effectiveness of pointer alias analyses, " Science of Computer Programming, vol. 39, no. 1, pp. 31 - 55, 2001.
    • (2001) Science of Computer Programming , vol.39 , Issue.1 , pp. 31-55
    • Hind, M.1    Pioli, A.2
  • 34
    • 3042658703 scopus 로고    scopus 로고
    • LLVM: A compilation framework for lifelong program analysis & transformation
    • C. Lattner and V. S. Adve, "LLVM: A compilation framework for lifelong program analysis & transformation, " in CGO, 2004, pp. 75-88.
    • (2004) CGO , pp. 75-88
    • Lattner, C.1    Adve, V.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.