Abstract:
While constructing information security systems,
one should allow for existence of the so-called Troyan horses and other
hidden holes to attack.
In this paper, we model such a situation on the base of a pair of automata,
legal and illegal. which are controlled by a common input.
We give a definition of a subliminal illegal control channel.
Existence conditions and examples of subliminal channels are given. This research was supported by the Russian Foundation for Basic Research, grant 97–01–00162.