期刊文献+

基于操作语义的时间隐通道分析 被引量:1

Analysis of covert timing channels based on operational semantics
在线阅读 下载PDF
导出
摘要 主要讨论了计算机信息安全领域中比较热点的话题——基于操作语义的时间隐通道。根据隐通道中的时间隐通道的特点和存在的最小条件,针对其特点提出了一种搜索方法。该搜索方法将进程看作一个抽象机状态机,以Plotkin的结构化操作语义等推导规则为基础,以及完整的信息传导操作语义的模型,分析了两个高低安全级进程抽象机状态变化及其状态动态变化序列,最后对可视窗口的分析,可以找到其中存在的时间隐通道。 More hot topic is discussed in the field of computer information security --covert timing channels based on operational semantics. According to its characteristicsandexisting condition of coverttimingchannel in covertchannel, then the methods ofsearching based on its characteristics is proposed. The methods of searching considers process as an abstract machine, based on the reasoning rules of Plotkin' s structured operational semantics, and the integral information conduction operational semantics model. The states transformation and transformation sequences of two high and low security levels of the abstract machine are analyzed, and finally studying visual windows, then find the exsting covert timing channel.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第7期1593-1595,1599,共4页 Computer Engineering and Design
关键词 隐通道 时间隐通道 抽象机 信息传导 结构化操作语义 covert channel covert timing channel abstract machine information conduction structured operational semantics
  • 相关文献

参考文献8

  • 1National Computer Security Center.Department ofdefense trusted computer system evaluation criteria[S].DoD 5200.28-STD,1985-12.
  • 2Wang Changda,Ju Shiguang.Searching covert channels by identifying malicious subjects in the time domain[C].Proceedings from the Fiful Annual IEEE SMC Information Assurance Workshop,2004:68-73.
  • 3陈渝,及兰盛,吴涛,邓朝晖.关于时间隐通道问题分析[J].计算机与现代化,1996(1):12-17. 被引量:1
  • 4Nagatou Naoyuki.Watanabe Takuo.Run-time detection of covert channels[C].First International Conference on Availability,Reliability and Security,2006:577-584.
  • 5Chii-ten Tsai.Virgil D Gilgor,Sekar Chankersekaran C.On the identification of covert storage channels in secure systems[J].IEEE Transactions on Software Engineering,1990,16(6):569-580.
  • 6王昌达,鞠时光,杨珍,郭殿春.隐通道存在的最小条件及其应用[J].计算机科学,2005,32(1):77-79. 被引量:5
  • 7冯玉琳,李京,黄涛.对象语义理论和行为约束推理[J].计算机学报,1993,16(11):823-838. 被引量:12
  • 8刘志锋,鞠时光,李沛.基于操作语义的磁臂隐通道分析[J].计算机应用研究,2007,24(11):157-160. 被引量:2

二级参考文献40

  • 1冯玉琳,李京,黄涛.对象语义理论和行为约束推理[J].计算机学报,1993,16(11):823-838. 被引量:12
  • 2Kemmerer R A. Shared resource matrix methodology:A practical approach to indetifying covert channels. ACM Transactions on Computer Systems, 1983,1 (3) :256~277
  • 3Kemmerer R A. Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Transactions on Software Engineering, 1991,17 ( 11 )
  • 4TSAI Chii-Ren,et al. On the identification of covert storage channels in secure systems. IEEE Transactions on Software Engineering,1990,16(6): 569~580
  • 5Tsai C R,Gligor V D,Chandersekaran C S. A formal method for the identification of covert storage channels in source code. In:1987 IEEE Symposium on Security and Privacy, Oakland, CA,IEEE Computer Society,Computer Society Press, April 1987. 74~86
  • 6Ogurtsov N,Orman H,Schroeppel R,et al. Experimental Results of Covert Channel Limitation in One-Way Communication Systems,IEEE 1997
  • 7Kang M H,Moskowitz I S. A pump for rapid,reliable,secure communication. In: 1st ACM Conf on Computer and Communications Security,Fairfax, Virginia,Nov. 1993. 119 ~ 29
  • 8Hu Wei-Ming. Reducing timing channels with fuzzy time. IEEE,1991
  • 9Melliar-Smith P M,Moser L E. Protection against covert storage and timing channels. IEEE, 1991
  • 10Wang Chang-da,Ju Shi-guang,Yang Zhen,et al. Research on the Methods of Search and Elimination in Covert Channels. In:The Second Intl. Workshop on Gridand Cooperative Computering,Lecture Notes in Computer Seience,2003. 988~991

共引文献16

同被引文献9

  • 1王昌达,鞠时光,杨珍,郭殿春.隐通道存在的最小条件及其应用[J].计算机科学,2005,32(1):77-79. 被引量:5
  • 2庄泗华,王剑,张福新.检测Linux下的VFS型内核后门软件[J].计算机应用研究,2005,22(5):194-196. 被引量:2
  • 3夏耐,林志强,茅兵,谢立.隐蔽通道发现技术综述[J].计算机科学,2006,33(12):1-5. 被引量:5
  • 4Kolter Jeremy Z,Maloof Marcus A.Leaming to detect and classify malicious executables in the wild [C].Seattle,WA,USA: 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2004:2721-2744.
  • 5Lyda, Robert. Using entropy analysis to find encrypted and packed Malware[J].IEEE Security and Privacy,2007,5(2):40-45.
  • 6Piergiorgio Di Giacomo.COTS and open source software components: are they really different on the battlefield?[C].Bilbao,Spain: 4th International Conference on COTS-Based Software Systems, 2005:301-310.
  • 7Document OIML D-SW Working Draft 1. General Requirements for Software Controlled Measuring Instruments [S].OIML TC5/SC2/N7,2006.
  • 8Jonathan Bannet,David W Price,Algis Rudys,et al. Hack-a-Vote: Security issues with electronic voting systems[J].IEEE Security and Privacy Magazine,2004,2(1):32-37.
  • 9姚立红,訾小超,李建华.隐蔽通道的信息传递模型[J].电子学报,2008,36(11):2216-2219. 被引量:4

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部