{"_id":"Ps25T3kkao464iiZh","bibbaseid":"jaskolka-khedri-sabri-investigativesupportforinformationconfidentiality-2015","downloads":0,"creationDate":"2016-02-02T16:45:04.142Z","title":"Investigative Support for Information Confidentiality","author_short":["Jaskolka, J.","Khedri, R.","Sabri, K. E."],"year":2015,"bibtype":"article","biburl":"http://www.cas.mcmaster.ca/~khedri/wp-content/uploads/BIBLIOGRAPHY/cvbib.bib","bibdata":{"bibtype":"article","type":"article","abstract":"With the emergence of computers in daily activities and with the ever-growing complexity of communication networks and protocols, covert channels are becoming an eminent threat to the confidentiality of information. In light of this threat, we propose a technique to detect confidential information leakage via protocol-based covert channels. Although several works examine covert channel detection and analysis from the perspective of information theory by, for instance, analysing channel capacities, we propose a different technique that tackles the problem from a different perspective. The proposed technique takes an algebraic approach using relations. It provides tests to verify the existence of a leakage of information via a monitored covert channel. It also provides computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. We limit our focus to protocol-based covert channels and instances where the users of covert channels modulate the information that is being sent; either by encryption, or some other form of encoding. We also discuss possible applications of the proposed technique in digital forensics and cryptanalysis.","optannote":"\\\\ Submitted: Revision 1690 (<i>Submitted: December 8, 2014</i>)","author":[{"firstnames":["Jason"],"propositions":[],"lastnames":["Jaskolka"],"suffixes":[]},{"firstnames":["Ridha"],"propositions":[],"lastnames":["Khedri"],"suffixes":[]},{"firstnames":["Khair","Eddin"],"propositions":[],"lastnames":["Sabri"],"suffixes":[]}],"title":"Investigative Support for Information Confidentiality","journal":"Journal of Ambient Intelligence and Humanized Computing","pages":"425 – 451","publisher":"Elsevier","volume":"6","number":"4","month":"August","optnote":"(Submitted on December 08, 2014. Accepted on April 26, 2015. To Appear. This paper is an extended version of~[12] and~[13] that has been invited for submission in a Special Issue of the journal.)","year":"2015","bibtex":"@article{JaskolkaKhedriJAIHC2014,\n\tAbstract = {With the emergence of computers in daily activities and with the ever-growing complexity of communication networks and protocols, covert channels are becoming an eminent threat to the confidentiality of information. In light of this threat, we propose a technique to detect confidential information leakage via protocol-based covert channels. Although several works examine covert channel detection and analysis from the perspective of information theory by, for instance, analysing channel capacities, we propose a different technique that tackles the problem from a different perspective. The proposed technique takes an algebraic approach using relations. It provides tests to verify the existence of a leakage of information via a monitored covert channel. It also provides computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique.\n\nWe limit our focus to protocol-based covert channels and instances where the users of covert channels modulate the information that is being sent; either by encryption, or some other form of encoding. We also discuss possible applications of the proposed technique in digital forensics and cryptanalysis.},\n\tOPTAnnote = {\\\\ Submitted: Revision 1690 (\\textit{Submitted: December 8, 2014})},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tTitle = {Investigative Support for Information Confidentiality},\n\tJournal = {Journal of Ambient Intelligence and Humanized Computing},\n\tPages = {425 -- 451},\n\tPublisher = {Elsevier},\n\tvolume = {6},\n\tnumber= {4},\n\tmonth = {August},\n OPTNote= {(Submitted on December 08, 2014. Accepted on April 26, 2015. To Appear. This paper is an extended version of~[12] and~[13] that has been invited for submission in a Special Issue of the journal.)},\n\tYear = {2015}\n}\n\n\n\n%------------------------------------------------------\n%---------------------- Published 2014 -------\n%------------------------------------------------------\n\n","author_short":["Jaskolka, J.","Khedri, R.","Sabri, K. E."],"key":"JaskolkaKhedriJAIHC2014","id":"JaskolkaKhedriJAIHC2014","bibbaseid":"jaskolka-khedri-sabri-investigativesupportforinformationconfidentiality-2015","role":"author","urls":{},"metadata":{"authorlinks":{"khedri, r":"http://www.cas.mcmaster.ca/"}}},"search_terms":["investigative","support","information","confidentiality","jaskolka","khedri","sabri"],"keywords":[],"authorIDs":["fjFPj4EHaK6KNXhFi"],"dataSources":["R4pF6oKzFC7B5Dxhj"]}