{"_id":"2ucsjzcE98DqH2BEe","bibbaseid":"jaskolka-khedri-sabri-investigativesupportforinformationconfidentialitypartidetectingconfidentialinformationleakageviaprotocolbasedcovertchannels-2014","downloads":0,"creationDate":"2016-02-02T16:45:04.193Z","title":"Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-Based Covert Channels","author_short":["Jaskolka, J.","Khedri, R.","Sabri, K. E."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.cas.mcmaster.ca/~khedri/wp-content/uploads/BIBLIOGRAPHY/cvbib.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","abstract":"This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.","address":"Niagara Falls, ON, Canada","author":[{"firstnames":["Jason"],"propositions":[],"lastnames":["Jaskolka"],"suffixes":[]},{"firstnames":["Ridha"],"propositions":[],"lastnames":["Khedri"],"suffixes":[]},{"firstnames":["Khair","Eddin"],"propositions":[],"lastnames":["Sabri"],"suffixes":[]}],"booktitle":"Proceedings of the 9th International Conference on Future Networks and Communications","month":"August","note":"\\textbf<i>(Invited Paper)</i>","pages":"276 - 285","series":"Procedia Computer Science, FNC 2014 and MobiSPC 2014","title":"Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-Based Covert Channels","volume":"34","year":"2014","bibtex":"@inproceedings{Jaskolka2014ad,\n\tAbstract = {This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.},\n\tAddress = {Niagara Falls, ON, Canada},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tBooktitle = {Proceedings of the 9th International Conference on Future Networks and Communications},\n\tMonth = {August},\n\tNote = {\\textbf{\\textit{(Invited Paper)}}},\n\tPages = {276 - 285},\n\tSeries = {Procedia Computer Science, FNC 2014 and MobiSPC 2014},\n\tTitle = {Investigative Support for Information Confidentiality Part {I}: Detecting Confidential Information Leakage via Protocol-Based Covert Channels},\n\tVolume = {34},\n\tYear = {2014}\n}\n\n%-------\n","author_short":["Jaskolka, J.","Khedri, R.","Sabri, K. E."],"key":"Jaskolka2014ad","id":"Jaskolka2014ad","bibbaseid":"jaskolka-khedri-sabri-investigativesupportforinformationconfidentialitypartidetectingconfidentialinformationleakageviaprotocolbasedcovertchannels-2014","role":"author","urls":{},"metadata":{"authorlinks":{"khedri, r":"http://www.cas.mcmaster.ca/khedri/"}},"downloads":0,"html":""},"search_terms":["investigative","support","information","confidentiality","part","detecting","confidential","information","leakage","via","protocol","based","covert","channels","jaskolka","khedri","sabri"],"keywords":[],"authorIDs":["fjFPj4EHaK6KNXhFi"],"dataSources":["R4pF6oKzFC7B5Dxhj"]}