Title :
Multiple Trojan horse systems and covert channel analysis
Author :
Trostle, Jonathan T.
Author_Institution :
Mitre Corp., Bedford, MA, USA
Abstract :
The multiple Trojan horse system is a finite-state deterministic model with a high-level transmitter Trojan horse process, a low-level receiver Trojan horse process, and m conspiring Trojan horse processes. The conspiring processes attempt to aid the downgrading of data from the transmitter to the receiver. The capacity of a multiple Trojan horse system is a measure of the amount of information the high-level process can disclose to the low-level process. Any controlled signalling system can be viewed as a multiple Trojan horse system. The author gives an optimality equation which gives a way to recursively construct optimal strategies for both the receiver and conspiring processes. Computer algorithms can be constructed to iteratively compute the capacity and optimal strategies
Keywords :
computer viruses; security of data; conspiring Trojan horse processes; controlled signalling system; covert channel analysis; finite-state deterministic model; high-level transmitter Trojan horse process; low-level receiver Trojan horse; multiple Trojan horse system; Algorithm design and analysis; Control system synthesis; Control systems; Equations; Horses; Invasive software; Iterative algorithms; Process control; Signal processing; Transmitters;
Conference_Titel :
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2215-6
DOI :
10.1109/CSFW.1991.151565