Title :
Towards a model of storage jamming
Author :
McDermott, John ; Goldschlag, David
Author_Institution :
Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
Abstract :
Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Unity logic. We find that Unity logic, in conjunction with some high-level operators, models storage jamming in a natural way and allows us to reason about susceptibility, rate of jamming, and impact on persistent values
Keywords :
access control; cryptography; security of data; Unity logic; access controls; cryptographic techniques; detection mechanism; high-level operators; persistent values; rate of jamming; storage jamming model; susceptibility; Access control; Application software; Cryptography; Database systems; Degradation; Information systems; Invasive software; Jamming; Laboratories; Logic;
Conference_Titel :
Computer Security Foundations Workshop, 1996. Proceedings., 9th IEEE
Conference_Location :
Kenmare
Print_ISBN :
0-8186-7522-5
DOI :
10.1109/CSFW.1996.503703