1 / 46

Covert Channels Non-interference and Policy Composition

2. Topics. Problems with BLP ModelsCovert ChannelsComposing BLP modelsDeterministic NoninterferenceUnwinding theoremACL Interpretation of NoninterferenceRestating Noninterference w.r.t. AC matrix modelPolicy Changes over timeComposing deterministic noninterference secure systemsNondeducibil

merton
Download Presentation

Covert Channels Non-interference and Policy Composition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. 1 Covert Channels Non-interference and Policy Composition Chapter 8, Chapter 17

    2. 2 Topics Problems with BLP Models Covert Channels Composing BLP models Deterministic Noninterference Unwinding theorem ACL Interpretation of Noninterference Restating Noninterference w.r.t. AC matrix model Policy Changes over time Composing deterministic noninterference secure systems Nondeducibility Composing deducibly secure systems Generalized noninterference Composing generalized noninterference Restrictiveness Composing restrictive system

    3. 3 Covert channels Alice: TS user Bob: unclassified user Alice cannot pass information (i.e. write down) to Bob directly Can use an indirect way to pass information On a single CPU system both start submitting jobs If Alice wants to communicate: 0 to Bob, occupy the CPU for even units of time 1 to Bob occupy the CPU for odd units of times

    4. 4 Composing BLP models

More Related