• DocumentCode
    1073233
  • Title

    Covert flow trees: a visual approach to analyzing covert storage channels

  • Author

    Kemmerer, Richard A. ; Porras, Phillip A.

  • Author_Institution
    Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
  • Volume
    17
  • Issue
    11
  • fYear
    1991
  • fDate
    11/1/1991 12:00:00 AM
  • Firstpage
    1166
  • Lastpage
    1185
  • Abstract
    The authors introduce a technique for detecting covert storage channels using a tree structure called a covert flow tree (CFT). CFTs are used to perform systematic searches for operation sequences that allow information to be relayed through attributes and eventually detected by a listening process. When traversed, the paths of a CFT yield a comprehensive list of operation sequences which support communication via a particular resource attribute. These operation sequences are then analyzed and either discharged as benign or determined to be covert communication channels. Algorithms for automating the construction of CFTs and potential covert channel operation sequences are presented. To illustrate this technique, two example systems are analyzed and their results compared to two currently accepted analysis techniques performed on identical systems. This comparison shows that the CFT approach not only identified all covert storage channels found by the other analysis techniques, but discovered a channel not detected by the other techniques
  • Keywords
    security of data; trees (mathematics); attributes; covert channel operation sequences; covert flow tree; covert storage channels; listening process; resource attribute; tree structure; Bandwidth; Communication channels; Information analysis; Inspection; Multilevel systems; Performance analysis; Relays; Timing; Tree data structures; Tree graphs;
  • fLanguage
    English
  • Journal_Title
    Software Engineering, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0098-5589
  • Type

    jour

  • DOI
    10.1109/32.106972
  • Filename
    106972