Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2013, Vol. 30 ›› Issue (3): 403-409.DOI: 10.7523/j.issn.1002-1175.2013.03.019

Previous Articles     Next Articles

Study on usage scenarios of several new database covert channels

TIAN Xue, XU Zhen, CHEN Chi   

  1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2012-04-24 Revised:2012-06-20 Online:2013-05-15

Abstract:

Covert channel poses a threat to the confidentiality of high-level security databases. We study and summarize existing database covert channels based on the scenarios of use and propose a new method to classify database covert channels and to study their formation mechanisms. We propose several new constructing methods of database covert channels. In databases based on different DBMS we construct typical covert channels in real. The results of the comparative analysis show the possibility of the presentence of covert channels which are caused by the implementation defect.

Key words: covert channel, high-level security database, covert storage channel, covert timing channel

CLC Number: