Covert Channel Invisibility Theorem

  • Alexander Grusho
  • Nick Grebnev
  • Elena Timonina
Part of the Communications in Computer and Information Science book series (CCIS, volume 1)


We consider a sequence of finite products of a finite set. A statistical test problem is defined on every product. Consistent sequences of probability measures on these products of the set generate probability measures on the set of infinite sequences. Sufficient conditions of nonexistence for consistent test sequences are proved. These results may be interpreted from the point of view of covert channel secrecy.


covert channel consistent test sequence secrecy of data hiding 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Axelson, S.: The Base-Rate Fallacy and its Implications for the Difficulty, of Intrusion Detection. In: Proc. of the 6th Conference on Computer and Communications Security, November 1999 (1999)Google Scholar
  2. 2.
    Bainov, D., Grusho, A., Timonina, E., Volkovich, V.: On a Pobabilistic Model of Intrusion Detection. Int. J. of Pure and Appl. Math. 39(1) (2007)Google Scholar
  3. 3.
    Covert channels through the looking glass (October 2005)
  4. 4.
    Department of Defense Trusted Computer System Evaluation, Criteria. DoD (1985)Google Scholar
  5. 5.
    Grusho, A.: Subliminal channels and information security in computer systems. Descrete Mathematics and Applications 8(2), 127–134 (1998)zbMATHMathSciNetGoogle Scholar
  6. 6.
    Grusho, A.: On existence of subliminal channels. Descrete Mathematics and Applications. 9(1), 1–8 (1999)zbMATHMathSciNetCrossRefGoogle Scholar
  7. 7.
    Grusho, A., Kniazev, A., Timonina, E.: Detection of Illegal Information Flow. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.), MMM-ACNS 2005. LNCS, vol. 3685, pp. 235–244. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Grusho, A.A., Timonina, E.E.: Some relations between discrete statistical problems and properties of probability measures on topological spaces. Descrete Mathematics and Applications. 16(6), 547–554 (2006)CrossRefzbMATHMathSciNetGoogle Scholar
  9. 9.
    A Guide to Understanding Covert Channel Analysis of Trusted Systems. National Computer Security Center. — NCSC-TG-030. Ver. 1 (1993)Google Scholar
  10. 10.
    Lehmann, E.L.: Testing Statistical Hypotheses (Springer Texts in Statistics), 2nd edn. p. 600. Springer, Heidelberg (1997)Google Scholar
  11. 11.
    Wu, M., Liu, B.: Multimedia data hiding, p. 219. Springer, New York (2003)zbMATHGoogle Scholar
  12. 12.
    Prokhorov, U.V., Rozanov, U.A., Theory of probabilities. Moscow., Science (in Russian) (1973)Google Scholar
  13. 13.
    Shannon, C.: Works on Theory of Informatics and Cybernetics. Moscow. Foregin Literature, 830 (in Russian) (1963)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Alexander Grusho
    • 1
  • Nick Grebnev
    • 1
  • Elena Timonina
    • 2
  1. 1.Moscow State UniversityMoscowRussian Federation
  2. 2.Russian State University for the HumanitiesMoscoowRussian Federation

Personalised recommendations