Hidden channels and information security in computer systems
Diskretnaya Matematika, Tome 10 (1998) no. 1, pp. 3-9
Voir la notice de l'article provenant de la source Math-Net.Ru
While constructing information security systems,
one should allow for existence of the so-called Troyan horses and other
hidden holes to attack.
In this paper, we model such a situation on the base of a pair of automata,
legal and illegal. which are controlled by a common input.
We give a definition of a subliminal illegal control channel.
Existence conditions and examples of subliminal channels are given.This research was supported by the Russian Foundation for Basic Research, grant 97–01–00162.
@article{DM_1998_10_1_a0,
author = {A. A. Grusho},
title = {Hidden channels and information security in computer systems},
journal = {Diskretnaya Matematika},
pages = {3--9},
publisher = {mathdoc},
volume = {10},
number = {1},
year = {1998},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/DM_1998_10_1_a0/}
}
A. A. Grusho. Hidden channels and information security in computer systems. Diskretnaya Matematika, Tome 10 (1998) no. 1, pp. 3-9. http://geodesic.mathdoc.fr/item/DM_1998_10_1_a0/