首页> 外文期刊>IEEE Transactions on Software Engineering >On the identification of covert storage channels in secure systems
【24h】

On the identification of covert storage channels in secure systems

机译:关于安全系统中秘密存储通道的识别

获取原文
获取原文并翻译 | 示例

摘要

A practical method for the identification of covert storage channels is presented and its application to the source code of the Secure Xenix kernel is illustrated. The method is based on the identification of all visible/alterable kernel variables by using information-flow analysis of language code. The method also requires that, after the sharing relationships among the kernel primitives and the visible/alterable variables are determined, the nondiscretionary access rules implemented by each primitive be applied to identify the potential storage channels. The method can be generalized to other implementation languages, and has the following advantages: it helps discover all potential storage channels is kernel code, thereby helping determine whether the nondiscretionary access rules are implemented correctly; it helps avoid discovery of false flow violations and their unnecessary analysis; and it helps identify the kernel locations where audit code and time-delay variables need to be placed for covert-channel handling.
机译:提出了一种识别秘密存储通道的实用方法,并说明了其在Secure Xenix内核源代码中的应用。该方法基于对所有可见/可更改的内核变量的识别,方法是使用语言代码进行信息流分析。该方法还要求在确定了内核原语和可见/可更改变量之间的共享关系之后,将由每个原语实现的非随意访问规则应用于标识潜在的存储通道。该方法可以推广到其他实现语言,具有以下优点:它有助于发现所有潜在的存储通道都是内核代码,从而有助于确定非随意访问规则是否得到正确实现;它有助于避免发现错误的流量违规和对其进行不必要的分析;它可以帮助您确定需要放置审计代码和延时变量以进行秘密渠道处理的内核位置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号