Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-Based Covert Channels. Jaskolka, J., Khedri, R., & Sabri, K. E. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34, of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 276 - 285, Niagara Falls, ON, Canada, August, 2014. \textbf(Invited Paper)
abstract   bibtex   
This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.
@inproceedings{Jaskolka2014ad,
	Abstract = {This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.},
	Address = {Niagara Falls, ON, Canada},
	Author = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},
	Booktitle = {Proceedings of the 9th International Conference on Future Networks and Communications},
	Month = {August},
	Note = {\textbf{\textit{(Invited Paper)}}},
	Pages = {276 - 285},
	Series = {Procedia Computer Science, FNC 2014 and MobiSPC 2014},
	Title = {Investigative Support for Information Confidentiality Part {I}: Detecting Confidential Information Leakage via Protocol-Based Covert Channels},
	Volume = {34},
	Year = {2014}
}

%-------

Downloads: 0