Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2006, Vol. 32 ›› Issue (8): 1-3.

• Trend and Hot Technology •     Next Articles

Identifying and Dealing with Covert Channel

LIU Wenqing1,2,3, CHEN Zhe1, HAN Naiping2   

  1. 1. Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004; 2. China Standard Software Co.,Ltd., Shanghai 200233; 3. Engineering Research Center for Information Security Technology, Software Institute of Chinese Academy of Sciences, Beijing 100080
  • Online:2006-04-20 Published:2006-04-20

隐蔽通道标识与处理

刘文清 1,2,3,陈喆 1,韩乃平2   

  1. 1. 解放军信息工程大学电子技术学院,郑州 450004;2. 上海中标软件有限公司,上海 200233;3. 中国科学院软件研究所信息安全技术工程研究中心,北京 100080

Abstract: Recognition and dealing with covert channel is the key requirement of TCSEC to evaluate the B2 or above products, as well as the keyrequirement of international standard CC to evaluate the EAL5 or above products. Now covert channel analysis is the main bottleneck ofdevelopment of security information system with high security level in our country. This paper describes the mainstream methods to identificate anddeal with covert channel up to date and discusses the availability of these methods in the security-product-developing。

Key words: Covert channel; Design for security OS; Recognition and dealing with

摘要: 标识与处理隐蔽通道是美国橘皮书TCSEC 对B2 及以上级别安全产品的关键评估要求,也是国际标准CC 评估EAL5 及以上系统的关键指标。目前,隐蔽通道分析是阻碍我国开发高安全等级信息系统的主要瓶颈。该文介绍了迄今为止国际上标识与处理隐蔽通道的主流方法,探讨了使用这些方法对安全信息系统进行隐蔽通道分析的可行性。

关键词: 隐蔽通道;安全操作系统设计;标识与处理