-
1
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson, "A note on the confinement problem, " Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
2
-
-
0023169573
-
A formal method for the identification of covert storage channels in source code
-
C.-R. Tsai, V. D. Gligor, and C. S. Chandersekaran, "A formal method for the identification of covert storage channels in source code, " in IEEE Symposium on Security and Privacy, 1987, pp. 74-87.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 74-87
-
-
Tsai, C.-R.1
Gligor, V.D.2
Chandersekaran, C.S.3
-
6
-
-
77957969195
-
Covert channel research
-
Y. Wang, J. Wu, L. Ding, and X. Liao, "Covert channel research, " Journal of Software, vol. 21, no. 9, pp. 2262-2288, 2010.
-
(2010)
Journal of Software
, vol.21
, Issue.9
, pp. 2262-2288
-
-
Wang, Y.1
Wu, J.2
Ding, L.3
Liao, X.4
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning, "A lattice model of secure information flow, " Commun. ACM, vol. 19, no. 5, pp. 236-243, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0025438147
-
On the identification of covert storage channels in secure systems
-
C.-R. Tsai, V. D. Gligor, and C. S. Chandersekaran, "On the identification of covert storage channels in secure systems, " IEEE Trans. Software Eng., vol. 16, no. 6, pp. 569-580, 1990.
-
(1990)
IEEE Trans. Software Eng
, vol.16
, Issue.6
, pp. 569-580
-
-
Tsai, C.-R.1
Gligor, V.D.2
Chandersekaran, C.S.3
-
9
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
R. A. Kemmerer, "Shared resource matrix methodology: An approach to identifying storage and timing channels, " ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 256-277, 1983.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
10
-
-
84948947266
-
A practical approach to identifying storage and timing channels: Twenty years later
-
R. A. Kemmerer, "A practical approach to identifying storage and timing channels: Twenty years later, " in ACSAC, 2002, pp. 109-118.
-
(2002)
ACSAC
, pp. 109-118
-
-
Kemmerer, R.A.1
-
12
-
-
33750931965
-
Run-time detection of covert channels
-
N. Nagatou and T. Watanabe, "Run-time detection of covert channels, " in ARES, 2006, pp. 577-584.
-
(2006)
ARES
, pp. 577-584
-
-
Nagatou, N.1
Watanabe, T.2
-
13
-
-
0023292228
-
An experience using two covert channel analysis techniques on a real system design
-
J. T. Haigh, R. A. Kemmerer, J. McHugh, and W. D. Young, "An experience using two covert channel analysis techniques on a real system design, " IEEE Trans. Software Eng., vol. 13, no. 2, pp. 157-168, 1987.
-
(1987)
IEEE Trans. Software Eng
, vol.13
, Issue.2
, pp. 157-168
-
-
Haigh, J.T.1
Kemmerer, R.A.2
Mchugh, J.3
Young, W.D.4
-
14
-
-
0032641890
-
20 years of covert channel modeling and analysis
-
J. K. Millen, "20 years of covert channel modeling and analysis, " in IEEE Symposium on Security and Privacy, 1999, pp. 113-114.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 113-114
-
-
Millen, J.K.1
-
15
-
-
0023294988
-
Covert channels in LAN's
-
C. G. Girling, "Covert channels in LAN's, " IEEE Trans. Software Eng., vol. 13, no. 2, pp. 292-296, 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 292-296
-
-
Girling, C.G.1
-
16
-
-
80052935703
-
Improving performance of network covert timing channel through huffman coding
-
Gwangju, Korea, December
-
J. Wu, Y. Wang, L. Ding, and X. Liao, "Improving performance of network covert timing channel through huffman coding, " in The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010), Gwangju, Korea, December 2010.
-
(2010)
The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010)
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
Liao, X.4
-
17
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols, " IEEE Communications Surveys and Tutorials, vol. 9, no. 1-4, pp. 44-57, 2007.
-
(2007)
IEEE Communications Surveys and Tutorials
, vol.9
, Issue.1-4
, pp. 44-57
-
-
Zander, S.1
Armitage, G.J.2
Branch, P.3
-
18
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
L. Yao, X. Zi, L. Pan, and J. Li, "A study of on/off timing channel based on packet delay distribution, " Computers & Security, vol. 28, no. 8, pp. 785 - 794, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
Li, J.4
-
19
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. L. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization, " in SOSP, 2003, pp. 164-177.
-
(2003)
SOSP
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.L.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
20
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA: ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, " in CCS'09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 199-212.
-
(2009)
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
21
-
-
78650158728
-
Determinating timing channels in compute clouds
-
New York, NY, USA: ACM
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating timing channels in compute clouds, " in CCSW'10: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. New York, NY, USA: ACM, 2010, pp. 103-108.
-
(2010)
CCSW'10: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
22
-
-
77954737019
-
Load-based covert channels between xen virtual machines
-
K. Okamura and Y. Oyama, "Load-based covert channels between xen virtual machines, " in SAC, 2010, pp. 173-180.
-
(2010)
SAC
, pp. 173-180
-
-
Okamura, K.1
Oyama, Y.2
-
23
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing, " Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
24
-
-
70349682314
-
TCP/IP timing channels: Theory to implementation
-
S. H. Sellke, C.-C. Wang, S. Bagchi, and N. B. Shroff, "TCP/IP timing channels: Theory to implementation, " in INFOCOM, 2009, pp. 2204-2212.
-
(2009)
INFOCOM
, pp. 2204-2212
-
-
Sellke, S.H.1
Wang, C.-C.2
Bagchi, S.3
Shroff, N.B.4
-
25
-
-
14844330726
-
Ip covert timing channels: Design and detection
-
S. Cabuk, C. E. Brodley, and C. Shields, "Ip covert timing channels: design and detection, " in ACM Conference on Computer and Communications Security, 2004, pp. 178-187.
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
26
-
-
38049087058
-
Detection of covert channel encoding in network packet delays
-
de lUniversit́e de Dartmouth. Novembre
-
V. Berk, A. Giani, G. Cybenko, and N. Hanover, "Detection of covert channel encoding in network packet delays, " Rapport technique TR536, de lUniversit́e de Dartmouth. Novembre, 2005.
-
(2005)
Rapport Technique TR536
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
Hanover, N.4
-
27
-
-
65349144517
-
New definition of small message criterion and its application in transaction covert channel mitigating
-
H. Zeng, Y. Wang, W. Zu, J. Cai, and L. Ruan, "New definition of small message criterion and its application in transaction covert channel mitigating, " Journal of Software, vol. 20, no. 4, pp. 985-996, 2009.
-
(2009)
Journal of Software
, vol.20
, Issue.4
, pp. 985-996
-
-
Zeng, H.1
Wang, Y.2
Zu, W.3
Cai, J.4
Ruan, L.5
-
28
-
-
67649823284
-
A formal framework for real-time information flow analysis
-
J. Son and J. Alves-Foss, "A formal framework for real-time information flow analysis, " Comput. Secur., vol. 28, no. 6, pp. 421-432, 2009.
-
(2009)
Comput. Secur.
, vol.28
, Issue.6
, pp. 421-432
-
-
Son, J.1
Alves-Foss, J.2
-
29
-
-
0026260664
-
Covert flow trees: A visual approach to analyzing covert storage channels
-
R. A. Kemmerer and P. A. Porras, "Covert flow trees: A visual approach to analyzing covert storage channels, " IEEE Trans. Software Eng., vol. 17, no. 11, pp. 1166-1185, 1991.
-
(1991)
IEEE Trans. Software Eng
, vol.17
, Issue.11
, pp. 1166-1185
-
-
Kemmerer, R.A.1
Porras, P.A.2
-
30
-
-
33846272388
-
Looking back at the bell-la padula model
-
Tucson Arizona, USA, December
-
D. E. Bell, "Looking back at the bell-la padula model, " in Computer Security Applications Conference, 21st Annual, Tucson Arizona, USA, December 2005, pp. 337-351.
-
(2005)
Computer Security Applications Conference, 21st Annual
, pp. 337-351
-
-
Bell, D.E.1
-
31
-
-
0003400255
-
Integrity considerations for secure computer systems
-
April, Bedford, MA
-
K. J. Biba, "Integrity considerations for secure computer systems, " The MITRE Corporation, Bedford, MA, Tech. Rep. MTR-3153, April, 1977.
-
(1977)
The MITRE Corporation, Tech. Rep. MTR-3153
-
-
Biba, K.J.1
-
32
-
-
85061200460
-
A modular covert channel analysis methodology for trusted DG/UXTM
-
R. A. Kemmerer and T. Taylor, "A modular covert channel analysis methodology for trusted DG/UXTM, " in ACSAC, 1996, pp. 224-235.
-
(1996)
ACSAC
, pp. 224-235
-
-
Kemmerer, R.A.1
Taylor, T.2
-
33
-
-
0035153588
-
Evaluating the effectiveness of pointer alias analyses
-
M. Hind and A. Pioli, "Evaluating the effectiveness of pointer alias analyses, " Science of Computer Programming, vol. 39, no. 1, pp. 31 - 55, 2001.
-
(2001)
Science of Computer Programming
, vol.39
, Issue.1
, pp. 31-55
-
-
Hind, M.1
Pioli, A.2
-
34
-
-
3042658703
-
LLVM: A compilation framework for lifelong program analysis & transformation
-
C. Lattner and V. S. Adve, "LLVM: A compilation framework for lifelong program analysis & transformation, " in CGO, 2004, pp. 75-88.
-
(2004)
CGO
, pp. 75-88
-
-
Lattner, C.1
Adve, V.S.2
|