Slide 13
Slide 13 text
REFERENCES
● A guide to understanding covert channel capacity analysis of a trusted system, National computer security center, November 1993,
availble online at www.fas.org/irp/nsa/rainbow/tg030.htm ← primary source of Covert Channels
● Charles P. Pfleeger and Shari Lawrence Pfleeger. 2006. Security in Computing (4th Edition). Prentice Hall PTR, Upper Saddle River,
NJ, USA ← secondary source of Covert Channels
● Kemmerer, Richard A. "A practical approach to identifying storage and timing channels: Twenty years later." Computer Security
Applications Conference, 2002. Proceedings. 18th Annual. IEEE, 2002 ← Covert Channel overview
● Zander, Sebastian, Grenville J. Armitage, and Philip Branch. "A survey of covert channels and countermeasures in computer network
protocols." IEEE Communications Surveys and Tutorials 9.1-4 (2007): 44-57 ← Covert Channel prevention
● Butler W. Lampson. 1973. A note on the confinement problem. Commun. ACM 16, 10 (October 1973), 613-615 ← Covert Channel
blocking