covert channel
隐藏通道
隐蔽信道
2025-09-06 21:25 浏览次数 7
隐藏通道
隐蔽信道
Covert network channel网络隐蔽信道
covert storage channel隐蔽存储信道
network covert channel model网络隐蔽通道模型
covert storgeezerhood channel隐蔽存储信道
covert channel mark隐蔽通道标识
Storage Covert Channel信道
Network Covert Timing Channel网络隐蔽时间信道
covert timing channel隐蔽计时信道
covert channel mitigation隐蔽信道干扰
the tool has the system source code as input, and has the covert channel sequence as output, which implements the automation of covert channel identification.
该工具以系统源代码为输入,以隐蔽通道序列为输出,从而实现了隐通道搜索工作的自动化。
covert channel can leak sensitive information in a manner that violates the system「s security policy, so it will threaten the security of the system.
隐通道以一种违背系统安全策略的方式泄露秘密信息,对系统安全造成很大威胁。
farther, we analyse the covert channels caused by udt」s introduction, that is data dictionary covert channel and integrity restriction covert channel.
在此基础上,进一步分析了udt的实现给系统带来的两种隐通道:数据字典引起的隐通道和唯一性约束引起的隐通道。
the thirty years, development of covert channel analysis research is summarized.
隐通道分析是研究高安全性计算机系统不可回避的问题 。
research on covert channel analysis and related techniques in secure database systems;
隐通道分析是研究高安全性计算机系统不可回避的问题 。
now covert channel analysis is the main bottleneck of development of security information system with high security level in our country.
目前,隐蔽通道分析是阻碍我国开发高安全等级信息系统的主要瓶颈。
this paper presents a class of specific covert channels in database system-the covert channel using referential integrity. we compute their bandwidth and propose the methods to handle them.
该文提出了一类数据库系统所特有的隐通道一利用引用完整性约束传送信息的隐通道,分析了它们的带宽,并提出了处理这类隐通道的方法。
in the case of operating system, many threats and attacks are covert, and covert channel is one of them.
对操作系统来说,许多威胁和攻击是隐藏的,隐蔽通道就是其中一种。
this paper describes the mainstream methods to identificate and deal with covert channel up to date and discusses the availability of these methods in the security-product-developing.
该文介绍了迄今为止国际上标识与处理隐蔽通道的主流方法,探讨了使用这些方法对安全信息系统进行隐蔽通道分析的可行性。
covert channel analysis is an inevitable problem of high security computer system research.
隐通道分析是研究高安全性计算机系统不可回避的问题。
this paper describes the mainstream methods to identificate and deal with covert channel up to date and discusses the availability of these methods in the security…
该文介绍了迄今为止国际上标识与处理隐蔽通道的主流方法,探讨了使用这些方法对安全信息系统进行隐蔽通道分析的可行性。
network covert channel has been widely used for network attack.
网络隐蔽通道技术是一种被广泛应用的网络攻击技术。
finally, combining with an analysis example, the paper has explained the practical application of the covert channel identifying tool.
最后,结合一个分析实例来说明基于系统源代码的隐通道搜索工具的实际应用情况。
this thesis investigates the semantics of the multilevel secure data model, static and dynamic covert channel detections, and multilevel transaction schedules.
研究了多级安全数据模型的语义问题,静态的和动态的隐通道检测问题,多级事务的调度问题。
themain framework is introduced and the tcp packet header is analysed in details, then the method of realization covert channel in tcpprotocol is given.
论文给出了隐写术的主要框架、详细分析了tcp协议的包头;
the covert channel can be divided into two types: simple covert channel and complex covert channel.
在研究隐蔽通道的检测方法时,可以将隐蔽通道分成两大类:单一隐蔽通道和复合隐蔽通道。
covert channel analysis;
隐通道分析;
to alleviate the weakness of existed network covert channels in traffic concealing and proxy penetration, a new method of constructing covert channel based on bho is proposed.
针对现有网络隐蔽通道在流量隐藏和代理穿透方面的不足,提出一种基于浏览器帮助对象(bho)构建网络隐蔽通道的方法。
for improving the capacity of covert channel in complex network situation, multi-state network covert timing channel was proposed.
为在较复杂网络状况下,有效提高隐蔽信道的容量,提出了多进制网络时间隐蔽信道的设计。
this paper consider that the covert channel technology is not a separate technology, but a branch of information hiding technology.
并且认为隐信道技术不是一个独立的技术,而是信息隐藏技术的一个分支。