Scenarios and Covert Channels: Another Game...
Author(s) -
Loı̈c Hélouët,
Marc Zeitoun,
Aldric Degorre
Publication year - 2005
Publication title -
electronic notes in theoretical computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.242
H-Index - 60
ISSN - 1571-0661
DOI - 10.1016/j.entcs.2004.07.010
Subject(s) - covert , computer science , covert channel , linguistics , cloud computing , security information and event management , philosophy , cloud computing security , operating system
Covert channels are information leaks in systems that use resources to transfer secretly a message. They are a threat for security, performance, but also for a system's profitability. This paper proposes a new approach to detect covert channels from scenario models of protocols. The problem of finding covert channels in scenarios is first modeled as a game, in which a pair of malicious users {S,R} is trying to transfer information while the rest of the protocol tries to prevent it. The messages transferred are encoded by behavioral choices at some precise moments, and decoded by a transducer whose input vocabulary is an observation of the system. We then characterize the presence of a covert channel as the existence of a winning strategy for {S,R} and of a decoder
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom