Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On the Identification of Covert Storage Channels in Secure Systems
Tsai C., Gligor V., Shandersekaran C. IEEE Transactions on Software Engineering16 (6):569-580,1990.Type:Article
Date Reviewed: Sep 1 1991

A method of identifying covert storage channels in secure systems is based on analysis of source code. The method is illustrated with examples taken from an analysis of Secure Xenix.

The method is based on identifying all directly and indirectly visible and alterable kernel variables. It addresses and resolves the aliasing of kernel variables to determine their indirect alterability, and uses information flow analysis to determine the indirect visibility of kernel variables. The use of the variables by kernel primitives is then performed before applying the nondiscretionary secrecy or integrity rules to identify the channels.

The interesting aspect of this paper is that it deals with the code associated with the secure system rather than just formal top-level specification. In particular, the paper makes the point that a significant amount of implementation code and variables (such as those of many kernel processes) has no correspondent formal specifications, and this code may contain storage channels.

The authors claim that the methods described apply to other implementation languages, not just C. They also speculate on the covert channels that can arise at the hardware interface using as an example the status, position, and movement of a disk arm, but make no claims for their method to detect shared variables and flows of hardware or microcode specifications.

The paper is moderately abstract, but is readable by anyone who is interested enough to do so. It is recommended to anyone interested in the identification of covert channels in trusted code.

Reviewer:  James P. Anderson Review #: CR123863
Bookmark and Share
 
Security Kernels (D.4.6 ... )
 
 
Access Controls (D.4.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security Kernels": Date
A new security testing method and its application to the Secure Xenix Kernel
Gligor V., Chandersekaran C., Jiang W., Johri A., Luckenbaugh G., Reich L. IEEE Transactions on Software Engineering SE-13(2): 169-183, 1987. Type: Article
Oct 1 1987
A guide to kernel exploitation: attacking the core
Perla E., Oldani M., Syngress Publishing, Boston, MA, 2010.  442, Type: Book (978-1-597494-86-1)
Jun 8 2011

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy