Assignment6 - I , Travis McPeak, pledge that this is my own...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
I, Travis McPeak, pledge that this is my own independent work, which conforms to the guidelines of academic honesty as described in the course syllabus. Travis McPeak November 20, 2008 CECS 478 Homework #6 1. A covert timing channel can be transformed into an equivalent storage channel using a program that monitors the timing of whatever resource is used for the timing channel. The monitoring program would be essentially decoding the information gathered from the timing channel. To complete the process of transformation from timing to storage channel, the program needs to send the information out via a covert storage channel. 2. I have come up with an idea for using sent email to leak information covertly. In emails the time the email was sent is set by the sender. The way that this covert channel would work, is the email daemon would be modified to analyze the time of every outbound email. To transmit a “1” it would ensure that the minute in the send time is odd. To transmit a “0” it would ensure
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 4

Assignment6 - I , Travis McPeak, pledge that this is my own...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online