1987 IEEE Symposium on Security and Privacy 1987
DOI: 10.1109/sp.1987.10013
|View full text |Cite
|
Sign up to set email alerts
|

Covert Channel Capacity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
113
0

Year Published

2002
2002
2016
2016

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 173 publications
(114 citation statements)
references
References 4 publications
1
113
0
Order By: Relevance
“…Channel capacity as a security guarantee [6] has been studied for many different models of computation. Chatzikokolakis, Palamidessi and Panangaden use it to give a formula for anonymity analysis of protocols described by weakly symmetric matrices [23], based on the probabilistic anonymity approach by Bhargava and Palamidessi [24].…”
Section: State Of the Art And Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Channel capacity as a security guarantee [6] has been studied for many different models of computation. Chatzikokolakis, Palamidessi and Panangaden use it to give a formula for anonymity analysis of protocols described by weakly symmetric matrices [23], based on the probabilistic anonymity approach by Bhargava and Palamidessi [24].…”
Section: State Of the Art And Related Workmentioning
confidence: 99%
“…Maximum leakage is known in security theory as channel capacity, ranging over all attackers with the same observational power but different prior information on the secret. As said, no single attack can leak an amount of information higher than the system's channel capacity [6]. For a deterministic system, the leakage is the entropy of the observable behavior of the system conditioned by the attacker's behavior [7], and thus computing the channel capacity reduces to computing the behavior of the system that maximizes entropy.…”
Section: Introductionmentioning
confidence: 99%
“…However his definition is not aimed to measure leakage but to define it. Other pioneers on the use of information theory in the context of security are Dennings, McLean and Millen [9,8,20,21]. In recent years, a theoretical framework has been established based on Shannon's information theory to allow static, quantitative program analysis that provides an expectation of leakage in programs [15,16,17,23].…”
Section: Related Workmentioning
confidence: 99%
“…Since [10], various techniques have been developed to both detect the existence of covert channels [11], or to disrupt them by minimizing their effective bandwidth [12]. A channel bandwidth is a measurement typically used to characterize the threat level each covert channel possesses.…”
Section: B Covert Channel and Steganographymentioning
confidence: 99%