On the Modelling, Analysis, and Mitigation of Distributed Covert Channels
暂无分享,去创建一个
[1] Robert M. Keller,et al. Formal verification of parallel programs , 1976, CACM.
[2] Bruce E. Hajek,et al. An information-theoretic and game-theoretic study of timing channels , 2002, IEEE Trans. Inf. Theory.
[3] Virgil D. Gligor,et al. A bandwidth computation model for covert storage channels and its applications , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[4] Amir Pnueli,et al. The temporal logic of programs , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).
[5] Ridha Khédri,et al. A Formulation of the Potential for Communication Condition using C2KA , 2014, GandALF.
[6] Ira S. Moskowitz,et al. Algebraic information theory for binary channels , 2010, Theor. Comput. Sci..
[7] Roberto Gorrieri,et al. A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..
[8] Yanhong A. Liu,et al. Efficient type inference for secure information flow , 2006, PLAS '06.
[9] George Gratzer,et al. Universal Algebra , 1979 .
[10] Jorge Lobo,et al. Minimal and Consistent Evolution of Knowledge Bases , 1997, J. Appl. Non Class. Logics.
[11] Richard A. Kemmerer,et al. Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.
[12] Gustavus J. Simmons,et al. The Subliminal Channel and Digital Signature , 1985, EUROCRYPT.
[13] Reiner Hähnle,et al. Integration of a security type system into a program logic , 2006, Theor. Comput. Sci..
[14] Louise E. Moser,et al. Protection against covert storage and timing channels , 1991, Proceedings Computer Security Foundations Workshop IV.
[15] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[16] John C. Wray,et al. An analysis of covert timing channels , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[17] Jonathan K. Millen. 20 years of covert channel modeling and analysis , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[18] Wei-Ming Hu,et al. Lattice scheduling and covert channels , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Judea Pearl,et al. On the Logic of Iterated Belief Revision , 1994, Artif. Intell..
[20] Saurabh Bagchi,et al. TCP/IP Timing Channels: Theory to Implementation , 2009, IEEE INFOCOM 2009.
[21] He Huang,et al. Multi-agent Cooperation: A Description Logic View , 2005, PRIMA.
[22] John M. Rushby,et al. Proof of separability: A verification technique for a class of a security kernels , 1982, Symposium on Programming.
[23] Abraham Silberschatz,et al. Operating System Concepts , 1983 .
[24] John McHugh,et al. An Experience Using Two Covert Channel Analysis Techniques on a Real System Design , 1987, IEEE Trans. Software Eng..
[25] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[26] David Gilbert,et al. A general theory of action languages , 1998 .
[27] Saul A. Kripke,et al. Semantical Considerations on Modal Logic , 2012 .
[28] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[29] Virgil D. Gligor,et al. On the Identification of Covert Storage Channels in Secure Systems , 1990, IEEE Trans. Software Eng..
[30] Vaughan R. Pratt,et al. Action Logic and Pure Induction , 1990, JELIA.
[31] Benjamin Steinberg,et al. A Theory of Transformation Monoids: Combinatorics and Representation Theory , 2010, Electron. J. Comb..
[32] Robin Milner,et al. A Calculus of Communicating Systems , 1980, Lecture Notes in Computer Science.
[33] Khair Eddin Sabri,et al. A formal test for detecting information leakage via covert channels , 2011, CSIIRW '11.
[34] Alexander A. Grusho,et al. Problems of Modeling in the Analysis of Covert Channels , 2010, MMM-ACNS.
[35] Robert F. Stärk,et al. Information Algebras and Consequence Operators , 2007, Logica Universalis.
[36] Jonathan T. Trostle,et al. Modelling a fuzzy time system , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[37] Maxim Anikeev,et al. Network Based Detection of Passive Covert Channels in TCP/IP , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[38] Zhe Wang,et al. Ontology Evolution in Description Logics , 2011 .
[39] Qinglei Zhang,et al. Endowing Concurrent Kleene Algebra with Communication Actions , 2014, RAMiCS.
[40] Mikaël Salaün. Practical overview of a Xen covert channel , 2009, Journal in Computer Virology.
[41] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[42] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[43] E. Cole,et al. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft , 2005 .
[44] Randy Browne,et al. Mode security: an infrastructure for covert channel suppression , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[45] Loïc Hélouët,et al. Covert channel detection using Information Theory , 2010, SecCo.
[46] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[47] Ullrich Hustadt,et al. Issues of Decidability for Description Logics in the Framework of Resolution , 1998, FTP.
[48] Antoni Olivé,et al. Updating knowledge bases while maintaining their consistency , 1995, The VLDB Journal.
[49] Yan Zhang,et al. Knowledge forgetting: Properties and applications , 2009, Artif. Intell..
[50] Jonathan K. Millen,et al. Covert Channel Capacity , 1987, 1987 IEEE Symposium on Security and Privacy.
[51] Daryl Johnson,et al. Behavior-Based Covert Channel in Cyberspace , 2009 .
[52] Jonathan K. Millen,et al. Hookup security for synchronous machines , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[53] James W. Gray,et al. Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[54] Georg Struth,et al. Hybrid process algebra , 2005, J. Log. Algebraic Methods Program..
[55] Georg Struth,et al. Concurrent Kleene Algebra , 2009, CONCUR.
[56] Ridha Khédri,et al. Exploring Covert Channels , 2011, 2011 44th Hawaii International Conference on System Sciences.
[57] Vaughan R. Pratt,et al. Modeling concurrency with partial orders , 1986, International Journal of Parallel Programming.
[58] Shiguang Ju,et al. The Dilemma of Covert Channels Searching , 2005, ICISC.
[59] Geoffrey Smith,et al. Eliminating covert flows with minimum typings , 1997, Proceedings 10th Computer Security Foundations Workshop.
[60] C. A. R. Hoare,et al. Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.
[61] Glynn Winskel,et al. Event Structures , 1986, Advances in Petri Nets.
[62] Jason Jaskolka,et al. Modeling, Analysis, and Detection of Information Leakage via Protocol-Based Covert Channels , 2010 .
[63] Narciso Martí-Oliet,et al. The Maude 2.0 System , 2003, RTA.
[64] Taeshik Shon,et al. A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine , 2003, ICICS.
[65] Gordon B. Agnew,et al. Covert channels in multiple access protocols , 2011, SIGCOMM 2011.
[66] Dieter Gollmann,et al. Insider Threats in Cyber Security , 2010, Insider Threats in Cyber Security.
[67] U. Hebisch,et al. Semirings: Algebraic Theory and Applications in Computer Science , 1998 .
[68] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[69] Qi Shi,et al. A formal model of security dependency for analysis and testing of secure systems , 1991, Proceedings Computer Security Foundations Workshop IV.
[70] Wei-Ming Hu,et al. Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[71] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[72] Vijay Varadharajan,et al. Petri net based modelling of information flow security requirements , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[73] Cynthia E. Irvine,et al. A security domain model to assess software for exploitable covert channels , 2008, PLAS '08.
[74] Antoni W. Mazurkiewicz,et al. Trace Theory , 1986, Advances in Petri Nets.
[75] Jan A. Bergstra,et al. Process Algebra for Synchronous Communication , 1984, Inf. Control..
[76] Ira S. Moskowitz,et al. A pump for rapid, reliable, secure communication , 1993, CCS '93.
[77] Rance Cleaveland,et al. Strategic directions in concurrency research , 1996, CSUR.
[78] A. Mikhalev,et al. Monoids, Acts and Categories: With Applications to Wreath Products and Graphs. A Handbook for Students and Researchers , 2011 .
[79] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[80] Loïc Hélouët,et al. Scenarios and Covert Channels: Another Game , 2005, GDV@CAV.
[81] Loïc Hélouët,et al. Covert channels detection in protocols using scenarios , 2003 .
[82] Micki Krause,et al. Information Security Management Handbook, Volume 2 , 2008 .
[83] Bruce Hajek,et al. The jamming game for timing channels , 1999, 1999 Information Theory and Networking Workshop (Cat. No.99EX371).
[84] Yuewei Dai,et al. A Covert Channel Detection Algorithm Based on TCP Markov Model , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[85] Ruby B. Lee,et al. Capacity estimation of non-synchronous covert channels , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[86] Marc Smeets,et al. Research Report: Covert Channels , 2006 .
[87] Ridha Khédri,et al. Mitigating covert channels based on analysis of the potential for communication , 2016, Theor. Comput. Sci..
[88] Diego Calvanese,et al. Description Logics for Information Integration , 2002, Computational Logic: Logic Programming and Beyond.
[89] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[90] C. A. R. Hoare,et al. Some Properties of Predicate Transformers , 1978, JACM.
[91] Roberto Gorrieri,et al. Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..
[92] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[93] Jeff Z. Pan,et al. Forgetting for knowledge bases in DL-Lite , 2010, Annals of Mathematics and Artificial Intelligence.
[94] C. A. R. Hoare,et al. An axiomatic basis for computer programming , 1969, CACM.
[95] Edsger W. Dijkstra,et al. Guarded commands, nondeterminacy and formal derivation of programs , 1975, Commun. ACM.
[96] Shiuh-Pyng Shieh. Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems , 1999, J. Inf. Sci. Eng..
[97] Enrico Tronci,et al. Automatic Covert Channel Analysis of a Multilevel Secure Component , 2004, ICICS.
[98] Steven J. Murdoch,et al. Covert channel vulnerabilities in anonymity systems , 2007 .
[99] Xiong Liu,et al. An Approach to Analyze Covert Channel Based on Finite State Machine , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[100] Duminda Wijesekera,et al. Securing UML Information Flow Using FlowUML , 2006, J. Res. Pract. Inf. Technol..
[101] Hong Zhao,et al. A phase-space reconstruction approach to detect covert channels in TCP/IP protocols , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[102] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[103] Hilarie K. Orman,et al. Experimental results of covert channel limitation in one-way communication systems , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[104] Zhen Yang,et al. Research on the Methods of Search and Elimination in Covert Channels , 2003, GCC.
[105] Vincent H. Berk,et al. Covert Channel Detection Using Process Query Systems , 2005 .
[106] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[107] Abraham Silberschatz,et al. Operating System Concepts: Desktop Edition , 2007 .
[108] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[109] Jeremy L. Jacob,et al. Separability and the Detection of Hidden Channels , 1990, Inf. Process. Lett..
[110] Hal Berghel,et al. Hiding data, forensics, and anti-forensics , 2007, CACM.
[111] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[112] W. van der Hoek,et al. Concurrent Dynamic Epistemic Logic , 2003 .
[113] Ruby B. Lee,et al. New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation , 2005, ISC.
[114] Bryan Sartin. ANTI-Forensics – distorting the evidence , 2006 .
[115] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[116] Rachel Greenstadt,et al. Covert Messaging through TCP Timestamps , 2002, Privacy Enhancing Technologies.
[117] Peter Gärdenfors,et al. On the logic of theory change: Partial meet contraction and revision functions , 1985, Journal of Symbolic Logic.
[118] Mickaël Salaiin. Practical overview of a Xen covert channel , 2010 .
[119] Takuo Watanabe,et al. Run-time detection of covert channels , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[120] Todd P. Coleman,et al. Covert timing channels codes for communication over interactive traffic , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[121] Georg Struth,et al. Foundations of Concurrent Kleene Algebra , 2009, RelMiCS.
[122] Rohit Parikh,et al. Reasoning about Communication Graphs , 2007 .
[123] Rohit Parikh,et al. The Logic of Communication Graphs , 2004, DALT.
[124] Werner Nutt,et al. Adding Epistemic Operators to Concept Languages , 1992, KR.
[125] Jonathan K. Millen. Finite-state noiseless covert channels , 1989, Proceedings of the Computer Security Foundations Workshop II,.
[126] Wiebe van der Hoek,et al. Dynamic Epistemic Logic and Knowledge Puzzles , 2007, ICCS.
[127] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[128] Ashish Patel,et al. Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences , 2007, Int. J. Netw. Secur..
[129] Qinglei Zhang,et al. On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey , 2012, ANT/MobiWIS.
[130] Jonathan K. Millen,et al. Non-interference, who needs it? , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[131] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[132] Eric B. Cole,et al. Network Security Bible , 2005 .
[133] Diego Calvanese,et al. Evolution of DL-Lite Knowledge Bases , 2010, SEMWEB.
[134] Qinglei Zhang,et al. Foundations of Communicating Concurrent Kleene Algebra , 2015 .
[135] Joseph Y. Halpern,et al. “Sometimes” and “not never” revisited: on branching versus linear time temporal logic , 1986, JACM.
[136] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[137] Dexter Kozen,et al. On Action Algebras , 1994 .
[138] Suvarna L. Kattimani,et al. Effective detection mechanism for TCP based hybrid covert channels in secure communication , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[139] Joseph Y. Halpern,et al. A Knowledge-Based Framework for Belief Change, Part II: Revision and Update , 1994, KR.
[140] Cynthia E. Irvine,et al. Toward a Security Domain Model for Static Analysis and Verification of Information Systems , 2007 .
[141] Edmund M. Clarke,et al. Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.
[142] Richard A. Kemmerer,et al. Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels , 1991, IEEE Trans. Software Eng..