Finding covert channels in protocols with message sequence charts: The case of RMTP2

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Covert channels are illegal information flows in systems. Recent research has shown how to detect covert channels in scenario descriptions. This paper recalls these results, and proposes a case study illustrating how scenarios can be used to detect illegal information flows from a scenario description of a protocol. Once a covert information flow is discovered, its bandwidth is computed using the (max, +) algebra. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Hélouët, L. (2005). Finding covert channels in protocols with message sequence charts: The case of RMTP2. In Lecture Notes in Computer Science (Vol. 3319, pp. 189–207). Springer Verlag. https://doi.org/10.1007/978-3-540-31810-1_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free