Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
422 May 2015 - 17:02ThomasMisa 
322 May 2015 - 17:00ThomasMisa 
227 Feb 2015 - 10:32ThomasMisa 
127 Feb 2015 - 10:05ThomasMisa 

Render style:     Context:


 History: r4 < r3 < r2 < r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Mechanisms>MechanismsCovertChannels (22 May 2015, ThomasMisa)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Covert Channels:

References

  • Butler Lampson, "Protection" [paper given in 1970<?>] ACM SIGOPS Operating Systems Review , Volume 8 Issue 1 (Jan 1974): 18-24 DOI
  • Butler Lampson, "A note on the confinement problem" [origin of "covert channels"] Communications of the ACM , Volume 16 Issue 10 (October 1973): 613-615 DOI
  • Steven B. Lipner, "A comment on the confinement problem," SOSP '75: Proceedings of the fifth ACM symposium on Operating systems principles (November 1975): 192-196 DOI
  • Richard Kemmerer, "A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later" (2002 | lock PDF): This article looks back on the first methodology outlined for discovering channels within a computer that may act as “covert channels,” passing data to programs or users that do not have the required security levels to see that data. Classic papers

 

Supported by the National Science Foundation CNS--TC 1116862 "Building an Infrastructure for Computer Security History."

Topic revision: r4 - 22 May 2015 - 17:02:06 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback