March 4, 2022 Outline

Reading: text, §18.3.1
Assignments: Homework 4, due March 9

Module 58

  1. Covert channel detection
    1. Shared Resource Matrix Model
    2. Information flow analysis
    3. Covert flow trees

  2. Shared resource matrix methodology
    1. Identify shared resources, attributes
    2. Operations accessing those attributes
    3. Building the matrix
    4. Issues about the methodology

  3. Information flow analysis
    1. Direct, indirect flows

  4. Covert flow trees
    1. Goals, symbols
    2. Construction of covert flow trees
    3. Analysis
    4. Example

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of March 6, 2022 at 7:12PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh