DocumentCode :
3098312
Title :
An analysis of covert timing channels
Author :
Wray, John C.
Author_Institution :
Digital Equipment Corp., Littleton, MA, USA
fYear :
1991
fDate :
20-22 May 1991
Firstpage :
2
Lastpage :
7
Abstract :
Covert channels have traditionally been categorized as either storage channels or timing channels. The author questions this categorization, and discusses channels that cannot be clearly identified as either storage or timing channels, but have aspects of both. A new model of timing channels is presented, which allows for channels that have characteristics of both storage channels and timing channels, and a method is given for constructing all channels in a computer system that have timing channel characteristics. Since R.A. Kemmerer´s (1982) shared resource matrix methodology has the potential to detect all channels that have storage characteristics, the two methods jointly have the capability to construct all channels in a computer system. The approach to timing channels provides a justification of specific mechanisms for reducing their bandwidth which were employed in the VAX Virtual Machine Monitor
Keywords :
DEC computers; security of data; telecommunication channels; telecommunications computing; virtual machines; VAX Virtual Machine Monitor; bandwidth; computer system; covert timing channels; shared resource matrix methodology; storage channels; timing channel characteristics; Clocks; Computerized monitoring; Condition monitoring; Disk drives; Earth Observing System; Time measurement; Timing; Trademarks; Virtual machine monitors; Virtual machining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-2168-0
Type :
conf
DOI :
10.1109/RISP.1991.130767
Filename :
130767
Link To Document :
بازگشت