AbstractCovert channels are information leaks in systems that use resources to transfer secretly a message. They are a threat for security, performance, but also for a system's profitability. This paper proposes a new approach to detect covert channels from scenario models of protocols. The problem of finding covert channels in scenarios is first modeled as a game, in which a pair of malicious users {S,R} is trying to transfer information while the rest of the protocol tries to prevent it. The messages transferred are encoded by behavioral choices at some precise moments, and decoded by a transducer whose input vocabulary is an observation of the system. We then characterize the presence of a covert channel as the existence of a winning str...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Chan...
In this paper we analyze the possibility for malicious agents to transmit an information possibly hi...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are information leaks in systems that use resources to transfer secretly a message. ...
AbstractCovert channels are information leaks in systems that use resources to transfer secretly a m...
AbstractWith the ability to leak confidential information in a secret manner, covert channels pose a ...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
Since the dawn of human communications, there have been people that have wished to correspond secret...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
ii To my family who has provided me with the support and encouragement to find my path to success ii...
International audienceCovert channels represent a security problem for information systems, since th...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
International audienceThis paper presents an information theory based detection framework for covert...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceWe analyze the problem of secure communication over a wiretap channel with an ...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Chan...
In this paper we analyze the possibility for malicious agents to transmit an information possibly hi...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are information leaks in systems that use resources to transfer secretly a message. ...
AbstractCovert channels are information leaks in systems that use resources to transfer secretly a m...
AbstractWith the ability to leak confidential information in a secret manner, covert channels pose a ...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
Since the dawn of human communications, there have been people that have wished to correspond secret...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
ii To my family who has provided me with the support and encouragement to find my path to success ii...
International audienceCovert channels represent a security problem for information systems, since th...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
International audienceThis paper presents an information theory based detection framework for covert...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceWe analyze the problem of secure communication over a wiretap channel with an ...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Chan...
In this paper we analyze the possibility for malicious agents to transmit an information possibly hi...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...