A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph

Author(s):  
JingZheng Wu ◽  
Liping Ding ◽  
Yongji Wang ◽  
Wei Han
2013 ◽  
Vol 427-429 ◽  
pp. 2512-2518
Author(s):  
Yang Jiao ◽  
Li Jun Xie ◽  
Zhi Yuan Zhao

Based on the security OS (SLinux) designing and implementing, this paper adopted information flow sequence to represent information flows and covert channels. Categorized the covert channels according to their information flow characteristics and discussed the integral method of dealing with covert channel. On this basis, proposed a genera l framework for covert channel identification founded on information flow analysis, and designed the optimization rules of covert channel identification. The framework and the rules can decrease the illegal flow of misinformation by restricting in formation flow combination spread, and provide the basis process for improving of analyzing covert channel.


Author(s):  
Tobias Hamann ◽  
Mihai Herda ◽  
Heiko Mantel ◽  
Martin Mohr ◽  
David Schneider ◽  
...  

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 176634-176645
Author(s):  
Wei Gao ◽  
Yan Shi ◽  
Shanzhi Chen

2008 ◽  
Vol 29 (2) ◽  
pp. 193-206 ◽  
Author(s):  
Hermann Hinrichs ◽  
Toemme Noesselt ◽  
Hans-Jochen Heinze

Sign in / Sign up

Export Citation Format

Share Document