On analyzing the bus-contention channel under fuzzy time

The bus-contention channel is a covert channel that can be exploited at a rate exceeding 1000 bits per second. Fuzzy time is a countermeasure first described by Wei-Ming Hu (1991). To assess the effectiveness of fuzzy time, it is desirable to have an information-theoretic capacity analysis of the bus-contention channel under fuzzy time. The author points out that the capacity of this channel depends on the assumptions that are held regarding the environment in which the channel is being exploited. He discusses various assumptions that may be held regarding the environment. He argues that a capacity analysis under the weakest of these assumptions (viz. the 'secure environment assumption) provides an upper bound on the capacity under the other assumptions discussed. It has been argued that a capacity analysis under the stronger assumptions is intractable. Therefore, an analysis under the weaker assumption provides the best available upper bound on the capacity of this channel. The author shows how to analyze the capacity of the channel under the weaker environment assumption and carries out such analysis of the channel using realistic system parameters and variety of fuzzy time parameters.<<ETX>>

[1]  Richard E. Blahut,et al.  Computation of channel capacity and rate-distortion functions , 1972, IEEE Trans. Inf. Theory.

[2]  James W. Gray On introducing noise into the bus-contention channel , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  John C. Wray,et al.  An analysis of covert timing channels , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Suguru Arimoto,et al.  An algorithm for computing the capacity of arbitrary discrete memoryless channels , 1972, IEEE Trans. Inf. Theory.

[5]  R. Gallager Information Theory and Reliable Communication , 1968 .

[6]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[7]  Wei-Ming Hu,et al.  Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  James W. Gray,et al.  Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.