Mitigation methods for illegal information timing flows on the socket program interface
Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 68-69
Cet article a éte moissonné depuis la source Math-Net.Ru
Some ways for creating and implementing information timing flows based on sockets in GNU/Linux operating system are considered. Methods for mitigating them based on the subjects blocking accesses are proposed.
@article{PDMA_2012_5_a34,
author = {A. N. Dolgikh},
title = {Mitigation methods for illegal information timing flows on the socket program interface},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {68--69},
year = {2012},
number = {5},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/}
}
A. N. Dolgikh. Mitigation methods for illegal information timing flows on the socket program interface. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 68-69. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/
[1] Informatsionnaya tekhnologiya. Zaschita informatsionnykh tekhnologii i avtomatizirovannykh sistem ot ugroz informatsionnoi bezopasnosti, realizuemykh s ispolzovaniem skrytykh kanalov. Ch. 1. Obschie polozheniya, GOST R 53113-2008, Standarty, M., 2008
[2] Efstathopoulos P. O., Krohn N. O., “Labels and Event Processes in the Asbestos Operating System”, Proceedings of the SOOP' 05, ACM, 2005
[3] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio, M., 2006, 176 pp.