Mathematical models of the covert channels

被引:0
|
作者
Grusho, A [1 ]
机构
[1] Russian State Univ Human, Moscow, Russia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The analysis of the covert channels is necessary for construction of the protected computer systems, stenography, including methods of construction of labels for the intellectual property protection and secure labels of the copies of information objects. In some conditions it is possible to prove the invisibility by the supervising subject of the covert channel. The review of cases is given, when in some absolute sense using methods of the theory of probability and statistics it is possible to prove the "invisibility" of the covert channel by the supervising subject.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [31] Crafting web counters into covert channels
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 337 - +
  • [32] DETECTING HARDWARE COVERT TIMING CHANNELS
    Venkataramani, Guru
    Chen, Jie
    Doroslovacki, Milos
    IEEE MICRO, 2016, 36 (05) : 17 - 27
  • [33] Covert channels in IPv6
    Lucena, Norka B.
    Lewandowski, Grzegorz
    Chapin, Steve J.
    PRIVACY ENHANCING TECHNOLOGIES, 2006, 3856 : 147 - 166
  • [34] On covert channels between virtual machines
    Ranjith, P.
    Priya, Chandran
    Shalini, Kaleeswaran
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (03): : 85 - 97
  • [35] Cross-router covert channels
    Ovadya, Adar
    Ogen, Rom
    Mallah, Yakov
    Gilboa, Niv
    Oren, Yossi
    arXiv, 2019,
  • [36] Detection of DNS Based Covert Channels
    Sheridan, Stephen
    Keane, Anthony
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 267 - 275
  • [37] Covert Channels in Network Time Security
    Lamshoeft, Kevin
    Dittmann, Jana
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 69 - 79
  • [38] COVERT CHANNELS IN LAN'S.
    Girling, C.Gray
    IEEE Transactions on Software Engineering, 1987, SE-13 (02) : 292 - 296
  • [39] Probabilistic Obfuscation through Covert Channels
    Stephens, Jon
    Yadegari, Babak
    Collberg, Christian
    Debray, Saumya
    Scheidegger, Carlos
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 243 - 257
  • [40] Analysis of Reversible Network Covert Channels
    Szary, Przemyslaw
    Mazurczyk, Wojciech
    Wendzel, Steffen
    Caviglione, Luca
    IEEE ACCESS, 2022, 10 : 41226 - 41238