compu15 - Finding Covert Storage Channels computer Science...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Finding Covert Storage Channels Sender Receiver Modify attribute Reference Recall that several conditions must hold for there to be a covert storage channel: 1 Both sender and receiver must have access to some attribute of a shared object. 2 The sender must be able to modify the attribute. 3 The receiver must be able to reference (view) that attribute. 4 A mechanism for initiating both processes, and sequencing their accesses to the shared resource, must exist. Lecture 16: 2 Detecting Covert Channels computer Science
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Richard Kemmerer (UC Santa Barbara) introduced the Shared Resource Matrix Methodology (SRMM). The idea is to build a table describing system commands and their potential effects on shared attributes of objects. READ WRITE DESTROY CREATE file existence R M M file size R M M M file level R M M An R means the operation R eferences (provides information about) the attribute under some circumstances . An M means the operation M odifies the attribute under some circumstances
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/16/2011 for the course CS 313K taught by Professor Boyer during the Spring '08 term at University of Texas at Austin.

Page1 / 5

compu15 - Finding Covert Storage Channels computer Science...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online