Outline for May 24, 2006
Reading: text, §17.3.2.2—17.5, 22.1—22.2
- Greetings and felicitations!
- Measuring capacity
- Intuitive, formal definitions of capacity
- Example
- Analyzing capacity of a noisy covert channel
- Distributed database using 2-phase commit
- Covert channel using 2-phase commit
- Computation of capacity
- Mitigating covert channels
- Preallocation and hold until process terminates
- Impose uniformity
- Randomize resource allocation
- Efficiency/performance vs. security
- The pump
- Analyzing the pump's performance and security
- Types of malicious logic
- Trojan horses
- Replicating Trojan horses
Version of May 24, 2006 at 1:12 PM
You can also obtain a PDF version of this.