Outline for May 24, 2006

Reading: text, §17.3.2.2—17.5, 22.1—22.2

  1. Greetings and felicitations!
  2. Measuring capacity
    1. Intuitive, formal definitions of capacity
    2. Example
  3. Analyzing capacity of a noisy covert channel
    1. Distributed database using 2-phase commit
    2. Covert channel using 2-phase commit
    3. Computation of capacity
  4. Mitigating covert channels
    1. Preallocation and hold until process terminates
    2. Impose uniformity
    3. Randomize resource allocation
    4. Efficiency/performance vs. security
    5. The pump
    6. Analyzing the pump's performance and security
  5. Types of malicious logic
    1. Trojan horses
    2. Replicating Trojan horses

Version of May 24, 2006 at 1:12 PM

You can also obtain a PDF version of this.