Covert channels are illegal information flows in systems. Recent research has shown how to detect covert channels in scenario descriptions. This paper recalls these results, and proposes a case study illustrating how scenarios can be used to detect illegal information flows from a scenario description of a protocol. Once a covert information flow is discovered, its bandwidth is computed using the (max, +) algebra. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Hélouët, L. (2005). Finding covert channels in protocols with message sequence charts: The case of RMTP2. In Lecture Notes in Computer Science (Vol. 3319, pp. 189–207). Springer Verlag. https://doi.org/10.1007/978-3-540-31810-1_13
Mendeley helps you to discover research relevant for your work.