Research on the Methods of Search and Elimination in Covert Channels

Covert channels can leak the confidential information under the supervision of security model, so its threat is serious. The working principle of covert channels was formalized and the least condition of its existence was also represented. Based on it, the taxonomy for the methods of search and elimination in covert channels was given. Furthermore, there are three prospect directions that can be used to search and eliminate covert channels were also discussed in this paper.

[1]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[2]  Paul A. Karger,et al.  Storage channels in disk arm optimization , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.