Auditing the use of covert storage channels in secure systems
- 1 January 1990
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 285-295
- https://doi.org/10.1109/risp.1990.63858
Abstract
Requirements for auditing covert storage channels are defined, and some fundamental problems which appear in most computer systems are illustrated. It is argued that audit subsystems designed to minimally satisfy the TCSEC (the DoD Trusted Computer System Evaluation Criteria) requirement are unable to detect many instances of covert channel use, and hence require major design and implementation changes before they are able to detect all use of covert storage channels. The design of the Secure Xenix tool for covert-channel audit that has been in operation since July 1989 is presented. Results of experiments indicate that the tool is able to detect all use of covert storage channels without raising false alarms.Keywords
This publication has 5 references indexed in Scilit:
- Finite-state noiseless covert channelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A bandwidth computation model for covert storage channels and its applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A Formal Method for the Identification of Covert Storage Channels in Source CodePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Design and Implementation of Secure XenixIEEE Transactions on Software Engineering, 1987
- Shared resource matrix methodologyACM Transactions on Computer Systems, 1983