Abstract:
Recognition and dealing with covert channel is the key requirement of TCSEC to evaluate the B2 or above products, as well as the keyrequirement of international standard CC to evaluate the EAL5 or above products. Now covert channel analysis is the main bottleneck ofdevelopment of security information system with high security level in our country. This paper describes the mainstream methods to identificate anddeal with covert channel up to date and discusses the availability of these methods in the security-product-developing。
Key words:
Covert channel; Design for security OS; Recognition and dealing with
摘要: 标识与处理隐蔽通道是美国橘皮书TCSEC 对B2 及以上级别安全产品的关键评估要求,也是国际标准CC 评估EAL5 及以上系统的关键指标。目前,隐蔽通道分析是阻碍我国开发高安全等级信息系统的主要瓶颈。该文介绍了迄今为止国际上标识与处理隐蔽通道的主流方法,探讨了使用这些方法对安全信息系统进行隐蔽通道分析的可行性。
关键词:
隐蔽通道;安全操作系统设计;标识与处理
LIU Wenqing, CHEN Zhe, HAN Naiping. Identifying and Dealing with Covert Channel[J]. Computer Engineering, 2006, 32(8): 1-3.
刘文清,陈喆 ,韩乃平. 隐蔽通道标识与处理[J]. 计算机工程, 2006, 32(8): 1-3.