March 10, 2021 Outline

Reading: text: §18.3
Due: Homework #5, due March 12; Completed Project, due March 12


Module 52

  1. Information flow analysis
    1. Direct, indirect flows

  2. Covert flow trees
    1. Goals, symbols
    2. Construction of covert flow trees
    3. Analysis
    4. Example
Module 53
  1. Capacity
    1. When is bandwidth of covert channel?
    2. Analysis
    3. Measuring capacity
Module 54
  1. Mitigating covert channels
    1. Preallocation and hold until process terminates
    2. Impose uniformity
    3. Randomize resource allocation
    4. Efficiency/performance vs. security


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of March 8, 2021 at 11:15PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh