Affordable Access

Publisher Website

Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels

Elsevier B.V.
DOI: 10.1016/j.procs.2014.07.023
  • Covert Channels
  • Confidentiality
  • Formal Methods
  • Information Leakage
  • Mathematics


Abstract This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.

There are no comments yet on this publication. Be the first to share your thoughts.