A novel anti-detection criterion for covert storage channel threat estimation
- 50 Downloads
This work was supported by Natural Science Foundation of China (Grant Nos. 61379048, 61672508, U1636213), and Chinese Academy of Sciences (CAS)/State Administration of Foreign Experts Affairs (SAFEA) International Partnership Program for Creative Research Teams.
- 1.Yan M, Shalabi Y, Torrellas J. ReplayConfusion: detecting cache-based covert channel attacks using record and replay. In: Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture, Taiwan, 2016. 1–14Google Scholar
- 2.Wang Y J, Wu J Z, Zeng H T, et al. Covert channel research. J Softw, 2010, 21: 2262–2288Google Scholar
- 4.Cabuk S, Brodley C E, Shields C. IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, 2004. 178–187Google Scholar
- 5.Moskowitz I S, Kang M H. Covert channels-here to stay? In: Proceedings of the 9th Annual Conference on Reliability, Fault Tolerance, Concurrency and Real Time, Security, Margherita, 1994. 235–243Google Scholar
- 6.Lin Y Q, Ding L P, Wu J Z, et al. Robust and efficient covert channel communications in operating systems: design, implementation and evaluation. In: Proceedings of the 7th International Conference on Software Security and Reliability-Companion, Washington, 2013. 45–52Google Scholar