Title :
Characterizing network covert storage channels
Author :
Eggers, K.W. ; Mallett, P.W.
Author_Institution :
MITRE Corp., McLean, VA, USA
Abstract :
A novel characterization is presented for covert channels in stand-alone systems. This characterization is used to examine the nature of covert channels in computer networks. Most network covert channels are shown to reduce to covert channels in standalone systems. The remaining identified network covert channels are identified to be examples of a more general Trojan horse leakage problem. The search for a general solution to this problem is identified as an important area for future research
Keywords :
computer networks; distributed databases; network operating systems; security of data; Trojan horse leakage problem; computer networks; network covert storage channels; stand-alone systems; Communication channels; Communication system security; Computer networks; Computer security; Data security; Information security; Operating systems; Secure storage; Switches; Timing;
Conference_Titel :
Aerospace Computer Security Applications Conference, 1988., Fourth
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-0895-1
DOI :
10.1109/ACSAC.1988.113348