RUS  ENG
Full version
JOURNALS // Diskretnaya Matematika // Archive

Diskr. Mat., 1998 Volume 10, Issue 1, Pages 3–9 (Mi dm411)

This article is cited in 7 papers

Hidden channels and information security in computer systems

A. A. Grusho


Abstract: While constructing information security systems, one should allow for existence of the so-called Troyan horses and other hidden holes to attack. In this paper, we model such a situation on the base of a pair of automata, legal and illegal. which are controlled by a common input. We give a definition of a subliminal illegal control channel. Existence conditions and examples of subliminal channels are given.
This research was supported by the Russian Foundation for Basic Research, grant 97–01–00162.

UDC: 519.7

Received: 03.12.1997

DOI: 10.4213/dm411


 English version:
Discrete Mathematics and Applications, 1998, 8:2, 127–133

Bibliographic databases:


© Steklov Math. Inst. of RAS, 2026