Towards a model of storage jamming

Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Unity logic. We find that Unity logic, in conjunction with some high-level operators, models storage jamming in a natural way and allows us to reason about susceptibility, rate of jamming, and impact on persistent values.

[1]  R. Gerth,et al.  Rooting UNITY , 1989, IWSSD '89.

[2]  D. Goldschlag,et al.  Mechanically verifying concurrent programs , 1992 .

[3]  R. Sandhu TERMINOLOGY, CRITERIA AND SYSTEM ARCHITECTURES FOR DATA INTEGRITY , 1989 .

[4]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[5]  Ravi S. Sandhu,et al.  Separation of Duties in Computerized Information Systems , 1990, DBSec.

[6]  Simon R. Wiseman,et al.  The Control of Integrity in Databases , 1990, DBSec.

[7]  Carlo Ghezzi,et al.  Proceedings of the 6th international workshop on Software specification and design , 1991 .

[8]  John P. McDermott,et al.  Storage Jamming , 1995, DBSec.

[9]  R. R. Jueneman Integrity controls for military and commercial applications , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[10]  Dan Thomsen,et al.  A comparison of type enforcement and Unix setuid implementation of well-formed transactions , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.

[11]  Z. G. Ruthberg,et al.  Report of the Invitational Workshop on Data Integrity | NIST , 1989 .

[12]  K. Mani Chandy,et al.  Parallel program design - a foundation , 1988 .

[13]  Jan K. Pachl A Simple Proof of a Completeness Result for leads-to in the UNITY Logic , 1992, Inf. Process. Lett..

[14]  Andrew Wood,et al.  The trusted path between SMITE and the user , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.