Mathematical models of the covert channels

被引:0
|
作者
Grusho, A [1 ]
机构
[1] Russian State Univ Human, Moscow, Russia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The analysis of the covert channels is necessary for construction of the protected computer systems, stenography, including methods of construction of labels for the intellectual property protection and secure labels of the copies of information objects. In some conditions it is possible to prove the invisibility by the supervising subject of the covert channel. The review of cases is given, when in some absolute sense using methods of the theory of probability and statistics it is possible to prove the "invisibility" of the covert channel by the supervising subject.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [21] COVERT FLOW TREES - A VISUAL APPROACH TO ANALYZING COVERT STORAGE CHANNELS
    KEMMERER, RA
    PORRAS, PA
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1991, 17 (11) : 1166 - 1185
  • [22] Problems of Modeling in the Analysis of Covert Channels
    Grusho, Alexander
    Grusho, Nikolai
    Timonina, Elena
    COMPUTER NETWORK SECURITY, 2010, 6258 : 118 - +
  • [23] Capacity Theorems for Covert Bosonic Channels
    Bullock, Michael S.
    Gagatsos, Christos N.
    Bash, Boulat A.
    2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [24] Secure Covert Channels in Multiplayer Games
    Diehl, Malte
    MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 117 - 122
  • [25] Covert Channels in Transport Layer Security
    Heinz, Corinna
    Mazurczyk, Wojciech
    Caviglione, Luca
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [26] Covert Communications in Packet Collision Channels
    Sheikholeslami, Azadeh
    Ghaderi, Majid
    Goeckel, Dennis
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [27] Embedding covert channels into TCP/IP
    Murdoch, SJ
    Lewis, S
    INFORMATION HIDING, 2005, 3727 : 247 - 261
  • [28] Detecting Protocol Switching Covert Channels
    Wendzel, Steffen
    Zander, Sebastian
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 280 - 283
  • [29] Constructing and Characterizing Covert Channels on GPGPUs
    Naghibijouybari, Hoda
    Khasawneh, Khaled N.
    Abu-Ghazaleh, Nael
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 354 - 366
  • [30] On Robust Covert Channels Inside DNS
    Nussbaum, Lucas
    Neyron, Pierre
    Richard, Olivier
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 51 - 62