DocumentCode :
274819
Title :
Characterizing network covert storage channels
Author :
Eggers, K.W. ; Mallett, P.W.
Author_Institution :
MITRE Corp., McLean, VA, USA
fYear :
1988
fDate :
12-16 Dec 1988
Firstpage :
275
Lastpage :
279
Abstract :
A novel characterization is presented for covert channels in stand-alone systems. This characterization is used to examine the nature of covert channels in computer networks. Most network covert channels are shown to reduce to covert channels in standalone systems. The remaining identified network covert channels are identified to be examples of a more general Trojan horse leakage problem. The search for a general solution to this problem is identified as an important area for future research
Keywords :
computer networks; distributed databases; network operating systems; security of data; Trojan horse leakage problem; computer networks; network covert storage channels; stand-alone systems; Communication channels; Communication system security; Computer networks; Computer security; Data security; Information security; Operating systems; Secure storage; Switches; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Aerospace Computer Security Applications Conference, 1988., Fourth
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-0895-1
Type :
conf
DOI :
10.1109/ACSAC.1988.113348
Filename :
113348
Link To Document :
بازگشت