中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
Designing and Modeling of Covert Channels in Operating Systems

文献类型:期刊论文

作者Lin, YQ ; Malik, SUR ; Bilal, K ; Yang, QS ; Wang, YJ ; Khan, SU
刊名IEEE TRANSACTIONS ON COMPUTERS
出版日期2016
卷号65期号:6页码:1706-1719
关键词Covert channels high-level Petri Nets (HLPN) operating systems modeling and security
ISSN号0018-9340
中文摘要Covert channels are widely considered as a major risk of information leakage in various operating systems, such as desktop, cloud, and mobile systems. The existing works of modeling covert channels have mainly focused on using finite state machines (FSMs) and their transforms to describe the process of covert channel transmission. However, a FSM is rather an abstract model, where information about the shared resource, synchronization, and encoding/decoding cannot be presented in the model, making it difficult for researchers to realize and analyze the covert channels. In this paper, we use the high-level Petri Nets (HLPN) to model the structural and behavioral properties of covert channels. We use the HLPN to model the classic covert channel protocol. Moreover, the results from the analysis of the HLPN model are used to highlight the major shortcomings and interferences in the protocol. Furthermore, we propose two new covert channel models, namely: (a) two channel transmission protocol (TCTP) model and (b) self-adaptive protocol (SAP) model. The TCTP model circumvents the mutual inferences in encoding and synchronization operations; whereas the SAP model uses sleeping time and redundancy check to ensure correct transmission in an environment with strong noise. To demonstrate the correctness and usability of our proposed models in heterogeneous environments, we implement the TCTP and SAP in three different systems: (a) Linux, (b) Xen, and (c) Fiasco. OC. Our implementation also indicates the practicability of the models in heterogeneous, scalable and flexible environments.
英文摘要Covert channels are widely considered as a major risk of information leakage in various operating systems, such as desktop, cloud, and mobile systems. The existing works of modeling covert channels have mainly focused on using finite state machines (FSMs) and their transforms to describe the process of covert channel transmission. However, a FSM is rather an abstract model, where information about the shared resource, synchronization, and encoding/decoding cannot be presented in the model, making it difficult for researchers to realize and analyze the covert channels. In this paper, we use the high-level Petri Nets (HLPN) to model the structural and behavioral properties of covert channels. We use the HLPN to model the classic covert channel protocol. Moreover, the results from the analysis of the HLPN model are used to highlight the major shortcomings and interferences in the protocol. Furthermore, we propose two new covert channel models, namely: (a) two channel transmission protocol (TCTP) model and (b) self-adaptive protocol (SAP) model. The TCTP model circumvents the mutual inferences in encoding and synchronization operations; whereas the SAP model uses sleeping time and redundancy check to ensure correct transmission in an environment with strong noise. To demonstrate the correctness and usability of our proposed models in heterogeneous environments, we implement the TCTP and SAP in three different systems: (a) Linux, (b) Xen, and (c) Fiasco. OC. Our implementation also indicates the practicability of the models in heterogeneous, scalable and flexible environments.
收录类别SCI
语种英语
WOS记录号WOS:000376879300003
公开日期2016-12-09
源URL[http://ir.iscas.ac.cn/handle/311060/17330]  
专题软件研究所_软件所图书馆_期刊论文
推荐引用方式
GB/T 7714
Lin, YQ,Malik, SUR,Bilal, K,et al. Designing and Modeling of Covert Channels in Operating Systems[J]. IEEE TRANSACTIONS ON COMPUTERS,2016,65(6):1706-1719.
APA Lin, YQ,Malik, SUR,Bilal, K,Yang, QS,Wang, YJ,&Khan, SU.(2016).Designing and Modeling of Covert Channels in Operating Systems.IEEE TRANSACTIONS ON COMPUTERS,65(6),1706-1719.
MLA Lin, YQ,et al."Designing and Modeling of Covert Channels in Operating Systems".IEEE TRANSACTIONS ON COMPUTERS 65.6(2016):1706-1719.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。