DocumentCode :
2137807
Title :
Multiple Trojan horse systems and covert channel analysis
Author :
Trostle, Jonathan T.
Author_Institution :
Mitre Corp., Bedford, MA, USA
fYear :
1991
fDate :
18-20 Jun 1991
Firstpage :
22
Lastpage :
33
Abstract :
The multiple Trojan horse system is a finite-state deterministic model with a high-level transmitter Trojan horse process, a low-level receiver Trojan horse process, and m conspiring Trojan horse processes. The conspiring processes attempt to aid the downgrading of data from the transmitter to the receiver. The capacity of a multiple Trojan horse system is a measure of the amount of information the high-level process can disclose to the low-level process. Any controlled signalling system can be viewed as a multiple Trojan horse system. The author gives an optimality equation which gives a way to recursively construct optimal strategies for both the receiver and conspiring processes. Computer algorithms can be constructed to iteratively compute the capacity and optimal strategies
Keywords :
computer viruses; security of data; conspiring Trojan horse processes; controlled signalling system; covert channel analysis; finite-state deterministic model; high-level transmitter Trojan horse process; low-level receiver Trojan horse; multiple Trojan horse system; Algorithm design and analysis; Control system synthesis; Control systems; Equations; Horses; Invasive software; Iterative algorithms; Process control; Signal processing; Transmitters;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2215-6
Type :
conf
DOI :
10.1109/CSFW.1991.151565
Filename :
151565
Link To Document :
بازگشت