DocumentCode
1703460
Title
An Approach to Analyze Covert Channel Based on Finite State Machine
Author
Liu, Xiong ; Hao, Jian-guo ; Dai, Yi-qi
Author_Institution
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
fYear
2010
Firstpage
438
Lastpage
442
Abstract
Most researches in the field of covert channel concerned a specific channel, and few works resolved the general situations. This paper focuses on the system that can be modeled as a finite state machine, introduces an approachto modify the machine. Researcher can use the modified finite state machine to set up a noiseless covert channel in the system, calculate the covert channel´s information leakage, and get the necessary and sufficient condition for the system to be secure. To show the approach´s availability, this paper gives an example to show the whole process.
Keywords
finite state machines; security of data; covert channel; finite state machine; information leakage; information security; noiseless covert channel; Automata; Channel capacity; Channel estimation; Entropy; Observers; Security; Sufficient conditions; covert channel; finite state machine; information security;
fLanguage
English
Publisher
ieee
Conference_Titel
Multimedia Information Networking and Security (MINES), 2010 International Conference on
Conference_Location
Nanjing, Jiangsu
Print_ISBN
978-1-4244-8626-7
Electronic_ISBN
978-0-7695-4258-4
Type
conf
DOI
10.1109/MINES.2010.98
Filename
5671025
Link To Document