Back to Search Start Over

An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.

Authors :
Haigh, J. Thomas
Kemmerer, Richard A.
McHugh, John
Young, William D.
Source :
IEEE Transactions on Software Engineering. Feb87, Vol. 13 Issue 2, p157-168. 12p. 2 Color Photographs, 6 Diagrams.
Publication Year :
1987

Abstract

This paper examines the application of two covert channel analysis techniques to a high level design for a real system, the Honeywell Secure Ada® Target (SAT). The techniques used were a version of the noninterference model of multilevel security due to Goguen and Meseguer and the shared resource matrix method of Kemmerer. Both techniques were applied to the Gypsy Abstract Model of the SAT. The paper discusses the application of the techniques and the nature of the covert channels discovered. The relative strengths and weaknesses of the two methods are discussed and criteria for an ideal covert channel tool are developed. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00985589
Volume :
13
Issue :
2
Database :
Academic Search Index
Journal :
IEEE Transactions on Software Engineering
Publication Type :
Academic Journal
Accession number :
14412226