• DocumentCode
    1994998
  • Title

    A kind of covert channel analysis method based on trusted pipeline

  • Author

    Sun, Yu ; Zhang, Xing

  • Author_Institution
    Comput. Sci. Dept., Beijing Univ. of Technol., Beijing, China
  • fYear
    2011
  • fDate
    16-18 Sept. 2011
  • Firstpage
    5660
  • Lastpage
    5663
  • Abstract
    The covert channel analysis has been the focus of high level secure operating system research. Firstly, the concept and analysis methods of covert channel are described. Secondly, combined with the classic non-interference model of information flow, concept of a trusted pipeline has been applied to eliminate storage covert channel. Finally, a storage covert channel of object existence is analyzed, and the effect of trusted pipeline in eliminating the covert channel is shown.
  • Keywords
    operating systems (computers); security of data; covert channel analysis method; information flow security; noninterference model; operating systems; trusted pipeline; Computational modeling; Educational institutions; Operating systems; Pipelines; Privacy; Security; Software engineering; Covert Channel; Non-interference; Process; Secure Operating System;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electrical and Control Engineering (ICECE), 2011 International Conference on
  • Conference_Location
    Yichang
  • Print_ISBN
    978-1-4244-8162-0
  • Type

    conf

  • DOI
    10.1109/ICECENG.2011.6058071
  • Filename
    6058071