DocumentCode :
3135810
Title :
A practical approach to identifying storage and timing channels: twenty years later
Author :
Kemmerer, Richard A.
Author_Institution :
Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
fYear :
2002
fDate :
2002
Firstpage :
109
Lastpage :
118
Abstract :
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared memory and process signals. Unfortunately, in practice one finds that computer systems are built such that users are not limited to communicating only through the intended communication channels. As a result, a well-founded concern of security-conscious system designers is the potential exploitation of system storage locations and timing facilities to provide unforeseen communication channels to users. These illegitimate channels are known as covert storage and timing channels. Prior to the presentation of this paper twenty years ago the covert channel analysis that took place was mostly ad hoc. Methods for discovering and dealing with these channels were mostly informal, and the formal methods were restricted to a particular specification language. This paper presents a methodology for discovering storage and timing channels that can be used through all phases of the software life cycle to increase confidence that all channels have been identified. In the original paper the methodology was presented and applied to an example system having three different descriptions: English, formal specification, and high order language implementation. In this paper only the English requirements are considered. However the paper also presents how the methodology has evolved and the influence it had on other work.
Keywords :
authorisation; software engineering; storage management; timing; English requirements; communication channels; covert channels; discretionary access controls; mandatory access controls; secure computer systems; security analysis; software life cycle; specification language; storage channels; system storage locations; timing channels; Access control; Communication channels; Communication system software; Computer science; Data security; Formal specifications; Information security; Protection; Secure storage; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2002. Proceedings. 18th Annual
ISSN :
1063-9527
Print_ISBN :
0-7695-1828-1
Type :
conf
DOI :
10.1109/CSAC.2002.1176284
Filename :
1176284
Link To Document :
بازگشت