Network covert channel has been widely used for network attack.
网络隐蔽通道技术是一种被广泛应用的网络攻击技术。
Covert channel technique is to hide the communication process itself.
隐秘信道技术是为了隐藏通信过程本身。
Covert channel analysis is an inevitable problem of high security computer system research.
隐通道分析是研究高安全性计算机系统不可回避的问题。
Detail design and code framework are given, tests are done to validate the network covert channel.
该文给出详细方案设计和代码框架,通过测试验证该隐蔽通道的有效性。
Information hiding techniques including steganography, Covert channel, digital watermark technology.
信息隐藏技术包括隐写术,隐信道技术,数字水印技术等。
In the case of operating system, many threats and attacks are covert, and covert channel is one of them.
对操作系统来说,许多威胁和攻击是隐藏的,隐蔽通道就是其中一种。
Illegal communications by covert channel in network become an important way to threaten the network security.
网络数据流中利用隐蔽通道来进行非法通信已逐渐成为威胁网络信息安全的一种重要手段。
For the identified covert channels, accurate bandwidth computation and appropriate covert-channel handling have been performed.
对被标识的隐蔽通道,准确地计算了它们的带宽,并进行了适当的隐蔽通道处理。
For improving the capacity of covert channel in complex network situation, multi-state network covert timing channel was proposed.
为在较复杂网络状况下,有效提高隐蔽信道的容量,提出了多进制网络时间隐蔽信道的设计。
Now covert channel analysis is the main bottleneck of development of security information system with high security level in our country.
目前,隐蔽通道分析是阻碍我国开发高安全等级信息系统的主要瓶颈。
Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.
隐通道以一种违背系统安全策略的方式泄露秘密信息,对系统安全造成很大威胁。
The tool has the system source code as input, and has the covert channel sequence as output, which implements the automation of covert channel identification.
该工具以系统源代码为输入,以隐蔽通道序列为输出,从而实现了隐通道搜索工作的自动化。
This paper analyzes a formal method of analyzing storage covert channel identification based on information flow analysis, discussing the key points in details.
本文系统介绍了隐通道的概念,着重阐述基于信息流的存储隐通道标识方法,讨论该方法中的关键问题和重要细节。
This method has less workload, also can directly analyze on the source code base and exclude the false results, and can help the following covert channel handling.
此方法具有工作量小,能直接对源代码进行分析,能排除伪结果,能帮助对隐蔽通道进行后续处理等优点。
This paper describes the mainstream methods to identificate and deal with covert channel up to date and discusses the availability of these methods in the security…
该文介绍了迄今为止国际上标识与处理隐蔽通道的主流方法,探讨了使用这些方法对安全信息系统进行隐蔽通道分析的可行性。
A mechanism for secure real-time database scenario, which combines SMC with the channel capacity, is presented to measure and mitigate the threat of transaction covert channel.
其后,基于安全实时数据库应用场景给出了结合短消息指标和信道容量的事务隐蔽信道度量和限制机制。
This paper presents a class of specific covert channels in database system-the covert channel using referential integrity. We compute their bandwidth and propose the methods to handle them.
该文提出了一类数据库系统所特有的隐通道一利用引用完整性约束传送信息的隐通道,分析了它们的带宽,并提出了处理这类隐通道的方法。
The chain analysis methodology was issued based on the data fusion technology. The character of complex covert channel, the chain analysis methodology and the design of the software were described.
文中提出了基于数据融合思想的链路分析法,并对复合隐蔽通道的特点、链路分析法检测复合隐蔽通道的理论以及软件的设计进行描述。
In this paper, we present a novel covert communication technique based on adaptive quantization index modulation (AQIM) and channel coding via the comparison of several existing ones.
比较目前几种信息隐藏技术,提出了一种基于自适应量化索引调制(AQIM)与信道编码实现信息隐藏通信的新方法。
We argue that audit subsystems designed to satisfy the TCSEC requirements and Suggestions are unable to detect many instances of covert storage channel use.
我们认为TCSEC要求和推荐的审计方法不能发现存储隐通道的许多运用实例。
The results of simulation show that the proposed multi-state network covert timing channels with higher channel capacity and all have their own characteristics and the practical value.
仿真实例结果表明,提出的三种多进制网络时间隐蔽信道具有较高的信道容量,各有特点和实用价值。
The results of simulation show that the proposed multi-state network covert timing channels with higher channel capacity and all have their own characteristics and the practical value.
仿真实例结果表明,提出的三种多进制网络时间隐蔽信道具有较高的信道容量,各有特点和实用价值。
应用推荐