SCIENCE CHINA Information Sciences, Volume 61 , Issue 4 : 048101(2018) https://doi.org/10.1007/s11432-017-9211-1

A novel anti-detection criterion for covert storage channel threat estimation

More info
  • ReceivedMay 26, 2017
  • AcceptedJul 19, 2017
  • PublishedJan 18, 2018


There is no abstract available for this article.


This work was supported by Natural Science Foundation of China (Grant Nos. 61379048, 61672508, U1636213), and Chinese Academy of Sciences (CAS)/State Administration of Foreign Experts Affairs (SAFEA) International Partnership Program for Creative Research Teams.


[1] Yan M, Shalabi Y, Torrellas J. ReplayConfusion: detecting cache-based covert channel attacks using record and replay. In: Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture, Taiwan, 2016. 1--14. Google Scholar

[2] Wang Y J, Wu J Z, Zeng H T, et al. Covert channel research. J Softw, 2010, 21: 2262--2288. Google Scholar

[3] Lin Y, Malik S U R, Bilal K. Designing and modeling of covert channels in operating systems. IEEE Trans Comput, 2016, 65: 1706-1719 CrossRef Google Scholar

[4] Cabuk S, Brodley C E, Shields C. IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, 2004. 178--187. Google Scholar

[5] Moskowitz I S, Kang M H. Covert channels-here to stay? In: Proceedings of the 9th Annual Conference on Reliability, Fault Tolerance, Concurrency and Real Time, Security, Margherita, 1994. 235--243. Google Scholar

[6] Lin Y Q, Ding L P, Wu J Z, et al. Robust and efficient covert channel communications in operating systems: design, implementation and evaluation. In: Proceedings of the 7th International Conference on Software Security and Reliability-Companion, Washington, 2013. 45--52. Google Scholar

[7] Xu C, Ding K, Cai J. Methods of determining weight scaling factors for geodetic-geophysical joint inversion. J Geodyn, 2009, 47: 39-46 CrossRef ADS Google Scholar

  • Table 1   Eight calculation policies
    Number Calculation policies Number Calculation policies Number Calculation policies
    1 $\Theta\!=\!{\rm~RP}_1\!\times\!{\rm~RP}_2\!\times\dots\times\!{\rm~RP}_n$ 4 $\Theta\!=\!1/({\rm~RP}_1+{\rm~RP}_2+\dots+{\rm~RP}_n)$ 7 $\Theta\!=\!1/({\rm~TIV}_1\!\times\!{\rm~TIV}_2\!\times\dots\times\!{\rm~TIV}_n)$
    2 $\Theta\!=\!{\rm~RP}_1+{\rm~RP}_2+\dots+{\rm~RP}_n$ 5 $\Theta\!=\!{\rm~TIV}_1\!\times\!{\rm~TIV}_2\!\times\dots\times\!{\rm~TIV}_n$ 8 $\Theta\!=\!1/({\rm~TIV}_1+{\rm~TIV}_2\!+\!\dots\!+\!{\rm~TIV}_n)$
    3 $\Theta\!=\!1/({\rm~RP}_1\!\times\!{\rm~RP}_2\!\times\dots\times\!{\rm~RP}_n)$ 6 $\Theta\!=\!{\rm~TIV}_1+{\rm~TIV}_2+\dots+{\rm~TIV}_n$