首页> 外文OA文献 >A study of covert channels in a trusted UNIX system
【2h】

A study of covert channels in a trusted UNIX system

机译:在受信任的UNIX系统中研究秘密通道

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Analysis and identification of potential channels for illicit information flow is not required for Class Bi trusted systems such as the Sun Microsystems Trusted Solaris 1.1 trusted computing base. When used in a multilevel context such channels would present a risk to data security. The problem addressed by this thesis is the identification of covert channels in Trusted Solaris and the determination if their exploitation can be detected using mechanisms provided to the security administrator. The approach taken to address this problem was to identify covert storage channels in the form of observable effects and exceptions of sharing internal databases by subjects at differing access classes. Software was developed to exploit the identified covert channels using a method requiring detailed specifications prior to the creation of code. Audit trails were obtained to evaluate the efficacy of audit in detecting active covert channel exploitation.
机译:对于Bi类受信任的系统(例如,Sun Microsystems受信任的Solaris 1.1信任的计算基础),不需要分析和识别非法信息流的潜在渠道。当在多级上下文中使用时,此类通道将对数据安全性构成风险。本文解决的问题是在Trusted Solaris中标识隐蔽通道,并确定是否可以使用提供给安全管理员的机制来检测隐秘通道的利用。解决此问题的方法是,以可观察到的效果以及不同访问级别的受试者共享内部数据库的例外形式识别隐蔽存储通道。开发软件以利用在创建代码之前需要详细规范的方法来利用已识别的秘密渠道。获得了审计跟踪,以评估审计在检测活动秘密通道利用方面的功效。

著录项

  • 作者

    DeJong Ronald Johannes;

  • 作者单位
  • 年度 1995
  • 总页数
  • 原文格式 PDF
  • 正文语种 en_US
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号