Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on channels that exploit interrupt-driven communication, which have been shown to pose a serious threat in practical experiments. Our work builds on our earlier model [1], which we used to compare the effectiveness of different countermeasures against such channels. The main novel contribution of this article is an approach to exploiting detailed knowledge about a given chan-nel in order to make the bandwidth analysis more precise.
Since the dawn of human communications, there have been people that have wished to correspond secret...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Interrupt-driven communication with hardware devices can be exploited for establishing covert ch...
Abstract We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert...
We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert channel...
This paper presents an information theory based detection framework for covert channels. We first sh...
This paper presents an information theory based detection framework for covert channels. We first sh...
iv vAbstract Interrupt-related covert channels allow two processes running on a single system to com...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Since the dawn of human communications, there have been people that have wished to correspond secret...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Interrupt-driven communication with hardware devices can be exploited for establishing covert ch...
Abstract We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert...
We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert channel...
This paper presents an information theory based detection framework for covert channels. We first sh...
This paper presents an information theory based detection framework for covert channels. We first sh...
iv vAbstract Interrupt-related covert channels allow two processes running on a single system to com...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Since the dawn of human communications, there have been people that have wished to correspond secret...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...