1 / 8

COVERT CHANNELS Ravi Sandhu

COVERT CHANNELS Ravi Sandhu. A covert channel is a communication channel based on the use of system resources not normally intended for communication between the subjects (processes) in the system. COVERT CHANNELS. Information is leaked unknown to the high user. COVERT CHANNELS.

sailor
Download Presentation

COVERT CHANNELS Ravi Sandhu

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COVERT CHANNELS Ravi Sandhu

  2. A covert channel is a communication channel based on the use of system resources not normally intended for communication between the subjects (processes) in the system COVERT CHANNELS

  3. Information is leaked unknown to the high user COVERT CHANNELS High Trojan Horse Infected Subject High User COVERT CHANNEL Low Trojan Horse Infected Subject Low User

  4. The concern is with subjects not users users are trusted (must be trusted) not to disclose secret information outside of the computer system subjects are not trusted because they may have Trojan Horses embedded in the code they execute star-property prevents overt leakage of information and does not address the covert channel problem COVERT CHANNELS

  5. Given 5GB pool of dynamically allocated memory HIGH PROCESS bit = 1 Þ request 5GB of memory bit = 0 Þ request 0GB of memory LOW PROCESS request 5GB of memory if allocated then bit = 0 otherwise bit = 1 RESOURCE EXHAUSTION CHANNEL(STORAGE CHANNELS)

  6. HIGH PROCESS bit = 1 Þ enter computation intensive loop bit = 0 Þ go to sleep LOW PROCESS perform a task with known computational requirements if completed quickly then bit = 0 otherwise bit = 1 LOAD SENSING CHANNEL(TIMING CHANNEL)

  7. identification close the channel or slow it down detect attempts to use the channel tolerate its existence COPING WITH COVERT CHANNELS

  8. Covert channels require a cooperating sender and receiver Side channels do not require a sender but nevertheless information is leaked SIDE CHANNELS VS COVERT CHANNELS

More Related