DocumentCode
1073233
Title
Covert flow trees: a visual approach to analyzing covert storage channels
Author
Kemmerer, Richard A. ; Porras, Phillip A.
Author_Institution
Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
Volume
17
Issue
11
fYear
1991
fDate
11/1/1991 12:00:00 AM
Firstpage
1166
Lastpage
1185
Abstract
The authors introduce a technique for detecting covert storage channels using a tree structure called a covert flow tree (CFT). CFTs are used to perform systematic searches for operation sequences that allow information to be relayed through attributes and eventually detected by a listening process. When traversed, the paths of a CFT yield a comprehensive list of operation sequences which support communication via a particular resource attribute. These operation sequences are then analyzed and either discharged as benign or determined to be covert communication channels. Algorithms for automating the construction of CFTs and potential covert channel operation sequences are presented. To illustrate this technique, two example systems are analyzed and their results compared to two currently accepted analysis techniques performed on identical systems. This comparison shows that the CFT approach not only identified all covert storage channels found by the other analysis techniques, but discovered a channel not detected by the other techniques
Keywords
security of data; trees (mathematics); attributes; covert channel operation sequences; covert flow tree; covert storage channels; listening process; resource attribute; tree structure; Bandwidth; Communication channels; Information analysis; Inspection; Multilevel systems; Performance analysis; Relays; Timing; Tree data structures; Tree graphs;
fLanguage
English
Journal_Title
Software Engineering, IEEE Transactions on
Publisher
ieee
ISSN
0098-5589
Type
jour
DOI
10.1109/32.106972
Filename
106972
Link To Document