Title :
A kind of covert channel analysis method based on trusted pipeline
Author :
Sun, Yu ; Zhang, Xing
Author_Institution :
Comput. Sci. Dept., Beijing Univ. of Technol., Beijing, China
Abstract :
The covert channel analysis has been the focus of high level secure operating system research. Firstly, the concept and analysis methods of covert channel are described. Secondly, combined with the classic non-interference model of information flow, concept of a trusted pipeline has been applied to eliminate storage covert channel. Finally, a storage covert channel of object existence is analyzed, and the effect of trusted pipeline in eliminating the covert channel is shown.
Keywords :
operating systems (computers); security of data; covert channel analysis method; information flow security; noninterference model; operating systems; trusted pipeline; Computational modeling; Educational institutions; Operating systems; Pipelines; Privacy; Security; Software engineering; Covert Channel; Non-interference; Process; Secure Operating System;
Conference_Titel :
Electrical and Control Engineering (ICECE), 2011 International Conference on
Conference_Location :
Yichang
Print_ISBN :
978-1-4244-8162-0
DOI :
10.1109/ICECENG.2011.6058071