References
Yan M, Shalabi Y, Torrellas J. ReplayConfusion: detecting cache-based covert channel attacks using record and replay. In: Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture, Taiwan, 2016. 1–14
Wang Y J, Wu J Z, Zeng H T, et al. Covert channel research. J Softw, 2010, 21: 2262–2288
Lin Y, Malik S U R, Bilal K, et al. Designing and modeling of covert channels in operating systems. IEEE Trans Comput, 2016, 65: 1706–1719
Cabuk S, Brodley C E, Shields C. IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, 2004. 178–187
Moskowitz I S, Kang M H. Covert channels-here to stay? In: Proceedings of the 9th Annual Conference on Reliability, Fault Tolerance, Concurrency and Real Time, Security, Margherita, 1994. 235–243
Lin Y Q, Ding L P, Wu J Z, et al. Robust and efficient covert channel communications in operating systems: design, implementation and evaluation. In: Proceedings of the 7th International Conference on Software Security and Reliability-Companion, Washington, 2013. 45–52
Xu C, Ding K, Cai J, et al. Methods of determining weight scaling factors for geodetic-geophysical joint inversion. J Geodyn, 2009, 47: 39–46
Acknowledgements
This work was supported by Natural Science Foundation of China (Grant Nos. 61379048, 61672508, U1636213), and Chinese Academy of Sciences (CAS)/State Administration of Foreign Experts Affairs (SAFEA) International Partnership Program for Creative Research Teams.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, C., Zhang, C., Wu, B. et al. A novel anti-detection criterion for covert storage channel threat estimation. Sci. China Inf. Sci. 61, 048101 (2018). https://doi.org/10.1007/s11432-017-9211-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9211-1