Abstract
This paper explains a range of techniques for covert channel control for the Stubs network security devices. The techniques deal with both timing and storage channels, and rely on a combination of channel elimination, reduction, and audit mechanisms. Although specific to the Stubs system, the techniques of analysis and control are adaptable to similar systems.
Preview
Unable to display preview. Download preview PDF.
References
Carlson. Communication Systems, 1986.
Wei-Ming Hu. Reducing Timing Channels with Fuzzy Time. In Proceedings of the Security and Privacy Conference. 8–20, Oakland, CA, 1991.
Myong H. Kang and Ira S. Moskowitz. A pump for rapid, reliable, secure communication. In Proc. of the 1st ACM Conference on Computer and Communication Security. 119–129, Fairfax, VA, November 1993.
Ira S. Moskowitz and Myong H. Kang. Covert Channels — Here to Stay? In Proc. of the Ninth Annual Conference on Computer Assurance (Compass'94): 235–243, Gaithersburg, MD, June 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, M.S., Ozols, M.A. (1996). Covert channel analysis for Stubs. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_34
Download citation
DOI: https://doi.org/10.1007/3-540-61996-8_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61996-3
Online ISBN: 978-3-540-49589-5
eBook Packages: Springer Book Archive