Designing and Modeling of Covert Channels in Operating Systems
文献类型:期刊论文
| 作者 | Lin, YQ ; Malik, SUR ; Bilal, K ; Yang, QS ; Wang, YJ ; Khan, SU |
| 刊名 | IEEE TRANSACTIONS ON COMPUTERS
![]() |
| 出版日期 | 2016 |
| 卷号 | 65期号:6页码:1706-1719 |
| 关键词 | Covert channels high-level Petri Nets (HLPN) operating systems modeling and security |
| ISSN号 | 0018-9340 |
| 中文摘要 | Covert channels are widely considered as a major risk of information leakage in various operating systems, such as desktop, cloud, and mobile systems. The existing works of modeling covert channels have mainly focused on using finite state machines (FSMs) and their transforms to describe the process of covert channel transmission. However, a FSM is rather an abstract model, where information about the shared resource, synchronization, and encoding/decoding cannot be presented in the model, making it difficult for researchers to realize and analyze the covert channels. In this paper, we use the high-level Petri Nets (HLPN) to model the structural and behavioral properties of covert channels. We use the HLPN to model the classic covert channel protocol. Moreover, the results from the analysis of the HLPN model are used to highlight the major shortcomings and interferences in the protocol. Furthermore, we propose two new covert channel models, namely: (a) two channel transmission protocol (TCTP) model and (b) self-adaptive protocol (SAP) model. The TCTP model circumvents the mutual inferences in encoding and synchronization operations; whereas the SAP model uses sleeping time and redundancy check to ensure correct transmission in an environment with strong noise. To demonstrate the correctness and usability of our proposed models in heterogeneous environments, we implement the TCTP and SAP in three different systems: (a) Linux, (b) Xen, and (c) Fiasco. OC. Our implementation also indicates the practicability of the models in heterogeneous, scalable and flexible environments. |
| 英文摘要 | Covert channels are widely considered as a major risk of information leakage in various operating systems, such as desktop, cloud, and mobile systems. The existing works of modeling covert channels have mainly focused on using finite state machines (FSMs) and their transforms to describe the process of covert channel transmission. However, a FSM is rather an abstract model, where information about the shared resource, synchronization, and encoding/decoding cannot be presented in the model, making it difficult for researchers to realize and analyze the covert channels. In this paper, we use the high-level Petri Nets (HLPN) to model the structural and behavioral properties of covert channels. We use the HLPN to model the classic covert channel protocol. Moreover, the results from the analysis of the HLPN model are used to highlight the major shortcomings and interferences in the protocol. Furthermore, we propose two new covert channel models, namely: (a) two channel transmission protocol (TCTP) model and (b) self-adaptive protocol (SAP) model. The TCTP model circumvents the mutual inferences in encoding and synchronization operations; whereas the SAP model uses sleeping time and redundancy check to ensure correct transmission in an environment with strong noise. To demonstrate the correctness and usability of our proposed models in heterogeneous environments, we implement the TCTP and SAP in three different systems: (a) Linux, (b) Xen, and (c) Fiasco. OC. Our implementation also indicates the practicability of the models in heterogeneous, scalable and flexible environments. |
| 收录类别 | SCI |
| 语种 | 英语 |
| WOS记录号 | WOS:000376879300003 |
| 公开日期 | 2016-12-09 |
| 源URL | [http://ir.iscas.ac.cn/handle/311060/17330] ![]() |
| 专题 | 软件研究所_软件所图书馆_期刊论文 |
| 推荐引用方式 GB/T 7714 | Lin, YQ,Malik, SUR,Bilal, K,et al. Designing and Modeling of Covert Channels in Operating Systems[J]. IEEE TRANSACTIONS ON COMPUTERS,2016,65(6):1706-1719. |
| APA | Lin, YQ,Malik, SUR,Bilal, K,Yang, QS,Wang, YJ,&Khan, SU.(2016).Designing and Modeling of Covert Channels in Operating Systems.IEEE TRANSACTIONS ON COMPUTERS,65(6),1706-1719. |
| MLA | Lin, YQ,et al."Designing and Modeling of Covert Channels in Operating Systems".IEEE TRANSACTIONS ON COMPUTERS 65.6(2016):1706-1719. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。

