On the Modelling, Analysis, and Mitigation of Distributed Covert Channels

[1]  Robert M. Keller,et al.  Formal verification of parallel programs , 1976, CACM.

[2]  Bruce E. Hajek,et al.  An information-theoretic and game-theoretic study of timing channels , 2002, IEEE Trans. Inf. Theory.

[3]  Virgil D. Gligor,et al.  A bandwidth computation model for covert storage channels and its applications , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[4]  Amir Pnueli,et al.  The temporal logic of programs , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).

[5]  Ridha Khédri,et al.  A Formulation of the Potential for Communication Condition using C2KA , 2014, GandALF.

[6]  Ira S. Moskowitz,et al.  Algebraic information theory for binary channels , 2010, Theor. Comput. Sci..

[7]  Roberto Gorrieri,et al.  A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..

[8]  Yanhong A. Liu,et al.  Efficient type inference for secure information flow , 2006, PLAS '06.

[9]  George Gratzer,et al.  Universal Algebra , 1979 .

[10]  Jorge Lobo,et al.  Minimal and Consistent Evolution of Knowledge Bases , 1997, J. Appl. Non Class. Logics.

[11]  Richard A. Kemmerer,et al.  Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.

[12]  Gustavus J. Simmons,et al.  The Subliminal Channel and Digital Signature , 1985, EUROCRYPT.

[13]  Reiner Hähnle,et al.  Integration of a security type system into a program logic , 2006, Theor. Comput. Sci..

[14]  Louise E. Moser,et al.  Protection against covert storage and timing channels , 1991, Proceedings Computer Security Foundations Workshop IV.

[15]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[16]  John C. Wray,et al.  An analysis of covert timing channels , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[17]  Jonathan K. Millen 20 years of covert channel modeling and analysis , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[18]  Wei-Ming Hu,et al.  Lattice scheduling and covert channels , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[19]  Judea Pearl,et al.  On the Logic of Iterated Belief Revision , 1994, Artif. Intell..

[20]  Saurabh Bagchi,et al.  TCP/IP Timing Channels: Theory to Implementation , 2009, IEEE INFOCOM 2009.

[21]  He Huang,et al.  Multi-agent Cooperation: A Description Logic View , 2005, PRIMA.

[22]  John M. Rushby,et al.  Proof of separability: A verification technique for a class of a security kernels , 1982, Symposium on Programming.

[23]  Abraham Silberschatz,et al.  Operating System Concepts , 1983 .

[24]  John McHugh,et al.  An Experience Using Two Covert Channel Analysis Techniques on a Real System Design , 1987, IEEE Trans. Software Eng..

[25]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[26]  David Gilbert,et al.  A general theory of action languages , 1998 .

[27]  Saul A. Kripke,et al.  Semantical Considerations on Modal Logic , 2012 .

[28]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[29]  Virgil D. Gligor,et al.  On the Identification of Covert Storage Channels in Secure Systems , 1990, IEEE Trans. Software Eng..

[30]  Vaughan R. Pratt,et al.  Action Logic and Pure Induction , 1990, JELIA.

[31]  Benjamin Steinberg,et al.  A Theory of Transformation Monoids: Combinatorics and Representation Theory , 2010, Electron. J. Comb..

[32]  Robin Milner,et al.  A Calculus of Communicating Systems , 1980, Lecture Notes in Computer Science.

[33]  Khair Eddin Sabri,et al.  A formal test for detecting information leakage via covert channels , 2011, CSIIRW '11.

[34]  Alexander A. Grusho,et al.  Problems of Modeling in the Analysis of Covert Channels , 2010, MMM-ACNS.

[35]  Robert F. Stärk,et al.  Information Algebras and Consequence Operators , 2007, Logica Universalis.

[36]  Jonathan T. Trostle,et al.  Modelling a fuzzy time system , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[37]  Maxim Anikeev,et al.  Network Based Detection of Passive Covert Channels in TCP/IP , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.

[38]  Zhe Wang,et al.  Ontology Evolution in Description Logics , 2011 .

[39]  Qinglei Zhang,et al.  Endowing Concurrent Kleene Algebra with Communication Actions , 2014, RAMiCS.

[40]  Mikaël Salaün Practical overview of a Xen covert channel , 2009, Journal in Computer Virology.

[41]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[42]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[43]  E. Cole,et al.  Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft , 2005 .

[44]  Randy Browne,et al.  Mode security: an infrastructure for covert channel suppression , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[45]  Loïc Hélouët,et al.  Covert channel detection using Information Theory , 2010, SecCo.

[46]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[47]  Ullrich Hustadt,et al.  Issues of Decidability for Description Logics in the Framework of Resolution , 1998, FTP.

[48]  Antoni Olivé,et al.  Updating knowledge bases while maintaining their consistency , 1995, The VLDB Journal.

[49]  Yan Zhang,et al.  Knowledge forgetting: Properties and applications , 2009, Artif. Intell..

[50]  Jonathan K. Millen,et al.  Covert Channel Capacity , 1987, 1987 IEEE Symposium on Security and Privacy.

[51]  Daryl Johnson,et al.  Behavior-Based Covert Channel in Cyberspace , 2009 .

[52]  Jonathan K. Millen,et al.  Hookup security for synchronous machines , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.

[53]  James W. Gray,et al.  Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[54]  Georg Struth,et al.  Hybrid process algebra , 2005, J. Log. Algebraic Methods Program..

[55]  Georg Struth,et al.  Concurrent Kleene Algebra , 2009, CONCUR.

[56]  Ridha Khédri,et al.  Exploring Covert Channels , 2011, 2011 44th Hawaii International Conference on System Sciences.

[57]  Vaughan R. Pratt,et al.  Modeling concurrency with partial orders , 1986, International Journal of Parallel Programming.

[58]  Shiguang Ju,et al.  The Dilemma of Covert Channels Searching , 2005, ICISC.

[59]  Geoffrey Smith,et al.  Eliminating covert flows with minimum typings , 1997, Proceedings 10th Computer Security Foundations Workshop.

[60]  C. A. R. Hoare,et al.  Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.

[61]  Glynn Winskel,et al.  Event Structures , 1986, Advances in Petri Nets.

[62]  Jason Jaskolka,et al.  Modeling, Analysis, and Detection of Information Leakage via Protocol-Based Covert Channels , 2010 .

[63]  Narciso Martí-Oliet,et al.  The Maude 2.0 System , 2003, RTA.

[64]  Taeshik Shon,et al.  A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine , 2003, ICICS.

[65]  Gordon B. Agnew,et al.  Covert channels in multiple access protocols , 2011, SIGCOMM 2011.

[66]  Dieter Gollmann,et al.  Insider Threats in Cyber Security , 2010, Insider Threats in Cyber Security.

[67]  U. Hebisch,et al.  Semirings: Algebraic Theory and Applications in Computer Science , 1998 .

[68]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[69]  Qi Shi,et al.  A formal model of security dependency for analysis and testing of secure systems , 1991, Proceedings Computer Security Foundations Workshop IV.

[70]  Wei-Ming Hu,et al.  Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[71]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[72]  Vijay Varadharajan,et al.  Petri net based modelling of information flow security requirements , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.

[73]  Cynthia E. Irvine,et al.  A security domain model to assess software for exploitable covert channels , 2008, PLAS '08.

[74]  Antoni W. Mazurkiewicz,et al.  Trace Theory , 1986, Advances in Petri Nets.

[75]  Jan A. Bergstra,et al.  Process Algebra for Synchronous Communication , 1984, Inf. Control..

[76]  Ira S. Moskowitz,et al.  A pump for rapid, reliable, secure communication , 1993, CCS '93.

[77]  Rance Cleaveland,et al.  Strategic directions in concurrency research , 1996, CSUR.

[78]  A. Mikhalev,et al.  Monoids, Acts and Categories: With Applications to Wreath Products and Graphs. A Handbook for Students and Researchers , 2011 .

[79]  Vincent H. Berk,et al.  Detection of Covert Channel Encoding in Network Packet Delays , 2005 .

[80]  Loïc Hélouët,et al.  Scenarios and Covert Channels: Another Game , 2005, GDV@CAV.

[81]  Loïc Hélouët,et al.  Covert channels detection in protocols using scenarios , 2003 .

[82]  Micki Krause,et al.  Information Security Management Handbook, Volume 2 , 2008 .

[83]  Bruce Hajek,et al.  The jamming game for timing channels , 1999, 1999 Information Theory and Networking Workshop (Cat. No.99EX371).

[84]  Yuewei Dai,et al.  A Covert Channel Detection Algorithm Based on TCP Markov Model , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[85]  Ruby B. Lee,et al.  Capacity estimation of non-synchronous covert channels , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[86]  Marc Smeets,et al.  Research Report: Covert Channels , 2006 .

[87]  Ridha Khédri,et al.  Mitigating covert channels based on analysis of the potential for communication , 2016, Theor. Comput. Sci..

[88]  Diego Calvanese,et al.  Description Logics for Information Integration , 2002, Computational Logic: Logic Programming and Beyond.

[89]  Theodore G. Handel,et al.  Hiding Data in the OSI Network Model , 1996, Information Hiding.

[90]  C. A. R. Hoare,et al.  Some Properties of Predicate Transformers , 1978, JACM.

[91]  Roberto Gorrieri,et al.  Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..

[92]  Geoffrey Smith,et al.  A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..

[93]  Jeff Z. Pan,et al.  Forgetting for knowledge bases in DL-Lite , 2010, Annals of Mathematics and Artificial Intelligence.

[94]  C. A. R. Hoare,et al.  An axiomatic basis for computer programming , 1969, CACM.

[95]  Edsger W. Dijkstra,et al.  Guarded commands, nondeterminacy and formal derivation of programs , 1975, Commun. ACM.

[96]  Shiuh-Pyng Shieh Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems , 1999, J. Inf. Sci. Eng..

[97]  Enrico Tronci,et al.  Automatic Covert Channel Analysis of a Multilevel Secure Component , 2004, ICICS.

[98]  Steven J. Murdoch,et al.  Covert channel vulnerabilities in anonymity systems , 2007 .

[99]  Xiong Liu,et al.  An Approach to Analyze Covert Channel Based on Finite State Machine , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[100]  Duminda Wijesekera,et al.  Securing UML Information Flow Using FlowUML , 2006, J. Res. Pract. Inf. Technol..

[101]  Hong Zhao,et al.  A phase-space reconstruction approach to detect covert channels in TCP/IP protocols , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[102]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[103]  Hilarie K. Orman,et al.  Experimental results of covert channel limitation in one-way communication systems , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[104]  Zhen Yang,et al.  Research on the Methods of Search and Elimination in Covert Channels , 2003, GCC.

[105]  Vincent H. Berk,et al.  Covert Channel Detection Using Process Query Systems , 2005 .

[106]  I. S. Moskowitz,et al.  Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.

[107]  Abraham Silberschatz,et al.  Operating System Concepts: Desktop Edition , 2007 .

[108]  Carla E. Brodley,et al.  IP covert timing channels: design and detection , 2004, CCS '04.

[109]  Jeremy L. Jacob,et al.  Separability and the Detection of Hidden Channels , 1990, Inf. Process. Lett..

[110]  Hal Berghel,et al.  Hiding data, forensics, and anti-forensics , 2007, CACM.

[111]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[112]  W. van der Hoek,et al.  Concurrent Dynamic Epistemic Logic , 2003 .

[113]  Ruby B. Lee,et al.  New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation , 2005, ISC.

[114]  Bryan Sartin ANTI-Forensics – distorting the evidence , 2006 .

[115]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[116]  Rachel Greenstadt,et al.  Covert Messaging through TCP Timestamps , 2002, Privacy Enhancing Technologies.

[117]  Peter Gärdenfors,et al.  On the logic of theory change: Partial meet contraction and revision functions , 1985, Journal of Symbolic Logic.

[118]  Mickaël Salaiin Practical overview of a Xen covert channel , 2010 .

[119]  Takuo Watanabe,et al.  Run-time detection of covert channels , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[120]  Todd P. Coleman,et al.  Covert timing channels codes for communication over interactive traffic , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[121]  Georg Struth,et al.  Foundations of Concurrent Kleene Algebra , 2009, RelMiCS.

[122]  Rohit Parikh,et al.  Reasoning about Communication Graphs , 2007 .

[123]  Rohit Parikh,et al.  The Logic of Communication Graphs , 2004, DALT.

[124]  Werner Nutt,et al.  Adding Epistemic Operators to Concept Languages , 1992, KR.

[125]  Jonathan K. Millen Finite-state noiseless covert channels , 1989, Proceedings of the Computer Security Foundations Workshop II,.

[126]  Wiebe van der Hoek,et al.  Dynamic Epistemic Logic and Knowledge Puzzles , 2007, ICCS.

[127]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[128]  Ashish Patel,et al.  Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences , 2007, Int. J. Netw. Secur..

[129]  Qinglei Zhang,et al.  On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey , 2012, ANT/MobiWIS.

[130]  Jonathan K. Millen,et al.  Non-interference, who needs it? , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[131]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[132]  Eric B. Cole,et al.  Network Security Bible , 2005 .

[133]  Diego Calvanese,et al.  Evolution of DL-Lite Knowledge Bases , 2010, SEMWEB.

[134]  Qinglei Zhang,et al.  Foundations of Communicating Concurrent Kleene Algebra , 2015 .

[135]  Joseph Y. Halpern,et al.  “Sometimes” and “not never” revisited: on branching versus linear time temporal logic , 1986, JACM.

[136]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[137]  Dexter Kozen,et al.  On Action Algebras , 1994 .

[138]  Suvarna L. Kattimani,et al.  Effective detection mechanism for TCP based hybrid covert channels in secure communication , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[139]  Joseph Y. Halpern,et al.  A Knowledge-Based Framework for Belief Change, Part II: Revision and Update , 1994, KR.

[140]  Cynthia E. Irvine,et al.  Toward a Security Domain Model for Static Analysis and Verification of Information Systems , 2007 .

[141]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.

[142]  Richard A. Kemmerer,et al.  Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels , 1991, IEEE Trans. Software Eng..