Skip to main content

Information Flow Graph: An Approach to Identifying Covert Storage Channels

  • Conference paper
Trusted Systems (INTRUST 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6802))

Included in the following conference series:

  • 802 Accesses

Abstract

The paper introduces a technique for detecting covert storage channels using a graph structure called an Information Flow Graph (IFG). The IFG can offer the information flows of the system for covert channel detection. By searching for the paths of an IFG, operation sequences can be gained, which will enhances the analyst’s understanding of the channels. To illustrate the technique, an example system is analyzed and the result is compared to two analysis approaches, the Shared Resources Matrix and the Covert Flow Trees.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Unified Exposition and Multics Interpretation. Mitre Crop., Bedford, MA, Tech. Rep. ESD_TR_75_306 (1975)

    Google Scholar 

  2. Kemmerer, R.A., Porras, P.A.: Covert Flow Trees: a Visual Approach to Analyzing Covert Storage Channels. IEEE Transactions on Software Engineering 17(11), 1166–1185 (1991)

    Article  Google Scholar 

  3. Kemmerer, R.A.: Shared Resource Matrix Methodology: an Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems 1(3), 256–277 (1983)

    Article  Google Scholar 

  4. Goguen, J., Meseguer, J.: Security Policies and Security Models. In: Proc. 1982 Symposium on Security and Privacy, pp. 11–20. IEEE Press, New York (1982)

    Google Scholar 

  5. Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236–243 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  6. Porras, P.A., Kemmerer, R.A.: Covert Flow Tree Analysis Approach to Covert Storage Channel Identification. Comput. Sci. Dept., Univ. California. Santa Barbara, Tech. Rep. No. TRCS 90-26 (December 1990)

    Google Scholar 

  7. Qing, S.H., Zhu, J.F.: Covet Channel Analysis on ANSHENG Secure Operating System. Journal of Software 15(9), 1385–1392 (2004)

    MATH  Google Scholar 

  8. McHugh, J.: Handbook for the Computer Security Certification of Trusted Systems - Covert Channel Analysis. Technical Report, Naval Research Laboratory (February 1996)

    Google Scholar 

  9. Shen, J., Qing, S., Shen, Q., Li, L.: Covert Channel Identification Founded on Information Flow Analysis. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 381–387. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Shen, J.J., Qing, S.H., Shen, Q.N., Li, L.P.: Optimization of covert channel identification. In: Proceeding of the Third IEEE International Security in Storage Workshop (SISW 2005), p. 13 (December 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Song, X., Ju, S., Wang, C., Zhou, C. (2011). Information Flow Graph: An Approach to Identifying Covert Storage Channels. In: Chen, L., Yung, M. (eds) Trusted Systems. INTRUST 2010. Lecture Notes in Computer Science, vol 6802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25283-9_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25282-2

  • Online ISBN: 978-3-642-25283-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics