Implementation of network covert channel model based on shared file
WANG Biao1,ZHANG Shi-tao2,FANG Ying-jue3
1. Department of Information Science and Technology, University of International Relations, Beijing 100091, China
2. School of Software, Tsinghua University, Beijing 100084, China
3. College of Mathematics and Computational Science, Shenzhen University, Shenzhen Guangdong 518060, China
WANG Biao ZHANG Shi-tao FANG Ying-jue. Implementation of network covert channel model based on shared file[J]. Journal of Computer Applications, 2012, 32(01): 78-81.
[1]张新宇,卿斯汉,马恒太,等.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159.[2]Department of Defense, Computer Security Center. Trusted computer system evaluation criteria [S], 1985.[3]BELL D E, LAPADULA L J. Secure computer systems: Mathematical foundations and model, MTR-2547 [R]. Bedford: The MITRE Corporation, 1973.[4]李涛,张凯泽,徐敏.基于FTP协议的隐蔽通道的研究与实现[J].科技风,2008(20):30-30.[5]张念,杨木清.ICMP协议中隐蔽通道的设计与实现[J].网络通讯及安全,2008,2(10):61-63.[6]卢大航.基于网络协议的隐蔽通道研究与实现[J].计算机工程与应用,2003,39(2):183-186.[7]郭浩然,王振兴,王倩,等.基于IPv6报头的隐蔽通道分析与防范[J].计算机工程,2009,35(14):160-162.[8]鞠时光,王昌达.隐通道的仿真分析[J].系统仿真学报,2006,18(6):1488-1492.[9]TSAI C R, GLIGOR V D, CHANDERSEKARAN C S. A formal method for the identification of covert storage channels in source code [J]. IEEE Transactions on Software Engineering, 1990, 16(6): 569-580.[10]李丽萍,王建华.网络传输中采用隐蔽通道实现秘密通信[J].计算机科学,2009,36(5):115-117.[11]卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849.