• DocumentCode
    745908
  • Title

    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design

  • Author

    Haigh, J. Thomas ; Kemmerer, Richard A. ; Mchugh, John ; Young, William D.

  • Author_Institution
    Honeywell Secure Computing Technology Center
  • Issue
    2
  • fYear
    1987
  • Firstpage
    157
  • Lastpage
    168
  • Abstract
    This paper examines the application of two covert channel analysis techniques to a high level design for a real system, the Honeywell Secure Ada® Target (SAT). The techniques used were a version of the noninterference model of multilevel security due to Goguen and Meseguer and the shared resource matrix method of Kemmerer. Both techniques were applied to the Gypsy Abstract Model of the SAT. The paper discusses the application of the techniques and the nature of the covert channels discovered. The relative strengths and weaknesses of the two methods are discussed and criteria for an ideal covert channel tool are developed.
  • Keywords
    Covert channels; formal specification; formal verification; multilevel security; noninterference security policies; shared resource matrix; Computer science; Computer security; Formal specifications; Formal verification; Information analysis; Information security; Multilevel systems; National security; Performance analysis; System analysis and design; Covert channels; formal specification; formal verification; multilevel security; noninterference security policies; shared resource matrix;
  • fLanguage
    English
  • Journal_Title
    Software Engineering, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0098-5589
  • Type

    jour

  • DOI
    10.1109/TSE.1987.226479
  • Filename
    1702197