|
This article is cited in 7 scientific papers (total in 7 papers)
Hidden channels and information security in computer systems
A. A. Grusho
Abstract:
While constructing information security systems,
one should allow for existence of the so-called Troyan horses and other
hidden holes to attack.
In this paper, we model such a situation on the base of a pair of automata,
legal and illegal. which are controlled by a common input.
We give a definition of a subliminal illegal control channel.
Existence conditions and examples of subliminal channels are given. This research was supported by the Russian Foundation for Basic Research, grant 97–01–00162.
Received: 03.12.1997
Citation:
A. A. Grusho, “Hidden channels and information security in computer systems”, Diskr. Mat., 10:1 (1998), 3–9; Discrete Math. Appl., 8:2 (1998), 127–133
Linking options:
https://www.mathnet.ru/eng/dm411https://doi.org/10.4213/dm411 https://www.mathnet.ru/eng/dm/v10/i1/p3
|
Statistics & downloads: |
Abstract page: | 1230 | Full-text PDF : | 724 | First page: | 4 |
|