A novel anti-detection criterion for covert storage channel threat estimation

  • Chong Wang
  • Changyou Zhang
  • Bin Wu
  • Yu’an Tan
  • Yongji Wang
Highlight
  • 48 Downloads

Notes

Acknowledgements

This work was supported by Natural Science Foundation of China (Grant Nos. 61379048, 61672508, U1636213), and Chinese Academy of Sciences (CAS)/State Administration of Foreign Experts Affairs (SAFEA) International Partnership Program for Creative Research Teams.

References

  1. 1.
    Yan M, Shalabi Y, Torrellas J. ReplayConfusion: detecting cache-based covert channel attacks using record and replay. In: Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture, Taiwan, 2016. 1–14Google Scholar
  2. 2.
    Wang Y J, Wu J Z, Zeng H T, et al. Covert channel research. J Softw, 2010, 21: 2262–2288Google Scholar
  3. 3.
    Lin Y, Malik S U R, Bilal K, et al. Designing and modeling of covert channels in operating systems. IEEE Trans Comput, 2016, 65: 1706–1719MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Cabuk S, Brodley C E, Shields C. IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, 2004. 178–187Google Scholar
  5. 5.
    Moskowitz I S, Kang M H. Covert channels-here to stay? In: Proceedings of the 9th Annual Conference on Reliability, Fault Tolerance, Concurrency and Real Time, Security, Margherita, 1994. 235–243Google Scholar
  6. 6.
    Lin Y Q, Ding L P, Wu J Z, et al. Robust and efficient covert channel communications in operating systems: design, implementation and evaluation. In: Proceedings of the 7th International Conference on Software Security and Reliability-Companion, Washington, 2013. 45–52Google Scholar
  7. 7.
    Xu C, Ding K, Cai J, et al. Methods of determining weight scaling factors for geodetic-geophysical joint inversion. J Geodyn, 2009, 47: 39–46CrossRefGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Chong Wang
    • 1
    • 2
    • 3
  • Changyou Zhang
    • 4
  • Bin Wu
    • 2
  • Yu’an Tan
    • 5
  • Yongji Wang
    • 2
    • 3
  1. 1.University of Chinese Academy of SciencesBeijingChina
  2. 2.Cooperative Innovation Center, Institute of SoftwareChinese Academy of SciencesBeijingChina
  3. 3.State Key Laboratory of Computer Science, Institute of SoftwareChinese Academy of SciencesBeijingChina
  4. 4.Laboratory of Parallel Software and Computational Science, Institute of SoftwareChinese Academy of SciencesBeijingChina
  5. 5.School of Computer Science and TechnologyBeijing Institute of TechnologyBeijingChina

Personalised recommendations