March 8, 2021 Outline

Reading: text: §18.2–18.3
Due: Homework #5, due March 12; Completed Project, due March 12


Module 50

  1. Isolation: program modification
    1. Compiling
    2. Loading
Module 51
  1. Covert channels
    1. Storage vs. timing
    2. Noise vs. noiseless
    3. Existence
    4. Bandwidth
Module 52
  1. Covert channel detection
    1. Shared Resource Matrix Model
    2. Information flow analysis
    3. Covert flow trees

  2. Shared resource matrix methodology
    1. Identify shared resources, attributes
    2. Operations accessing those attributes
    3. Building the matrix
    4. Issues about the methodology

  3. Information flow analysis
    1. Direct, indirect flows


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of March 8, 2021 at 11:06PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh