Mathematical models of the covert channels

被引:0
|
作者
Grusho, A [1 ]
机构
[1] Russian State Univ Human, Moscow, Russia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The analysis of the covert channels is necessary for construction of the protected computer systems, stenography, including methods of construction of labels for the intellectual property protection and secure labels of the copies of information objects. In some conditions it is possible to prove the invisibility by the supervising subject of the covert channel. The review of cases is given, when in some absolute sense using methods of the theory of probability and statistics it is possible to prove the "invisibility" of the covert channel by the supervising subject.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [1] Mathematical models of distribution channels.
    Lev, B
    INTERFACES, 2006, 36 (03) : 272 - 273
  • [2] Cloud-Based Machine Learning Models as Covert Communication Channels
    Krauss, Torsten
    Stang, Jasper
    Dmitrienko, Alexandra
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 141 - 157
  • [3] Construction of the covert channels
    Grusho, A
    Timonina, E
    COMPUTER NETWORK SECURITY, 2003, 2776 : 428 - 431
  • [4] Covert Channels on GPGPUs
    Naghibijouybari, Hoda
    Abu-Ghazaleh, Nael
    IEEE COMPUTER ARCHITECTURE LETTERS, 2017, 16 (01) : 22 - 25
  • [5] Keyboards and covert channels
    Shah, Gaurav
    Molina, Andres
    Blaze, Matt
    USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, 2006, : 59 - +
  • [6] COVERT CHANNELS IN LANS
    GIRLING, CG
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 292 - 296
  • [7] Mathematical models of optimal distribution of water in main channels
    Rakhimov, Shavkat
    Seytov, Aybek
    Rakhimova, Nasiba
    Xonimqulov, Bahrom
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [8] The dilemma of covert channels searching
    Wang, Changda
    Ju, Shiguang
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 169 - 174
  • [9] Concurrent Covert Communication Channels
    Amiruzzaman, Md
    Peyravi, Hassan
    Abdullah-Al-Wadud, M.
    Chung, Yoojin
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 203 - +
  • [10] Data exfiltration and covert channels
    Giani, Annarita
    Berk, Vincent H.
    Cybenko, George V.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201