Affiliation:
1. Xerox Palo Alto Research Center, Palo Alto, CA
Abstract
onfining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.
Publisher
Association for Computing Machinery (ACM)
Cited by
700 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Blockchain-Enabled Group Covert Channel against Transaction Forgery;Mathematics;2024-01-12
2. CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN;Communications in Computer and Information Science;2024
3. Mex+Sync: Software Covert Channels Exploiting Mutual Exclusion and Synchronization;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-12
4. AutoCC: Automatic Discovery of Covert Channels in Time-Shared Hardware;56th Annual IEEE/ACM International Symposium on Microarchitecture;2023-10-28
5. Covert Channel Detection and Generation Techniques: A Survey;2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA);2023-10-10