Systems analysis and dividing method orienting covert channel analysis

A system analysis and covert channel technology, applied in the field of system analysis and division oriented to covert channel analysis, can solve problems such as unfavorable analysis and processing

Inactive Publication Date: 2009-02-11
NANJING UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the covert channel analysis of the source code, aiming at the problem that the system code is large and intricate, which is not conducive to analy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems analysis and dividing method orienting covert channel analysis
  • Systems analysis and dividing method orienting covert channel analysis
  • Systems analysis and dividing method orienting covert channel analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] figure 2Shown is the workflow for performing system analysis and partitioning in this method. Step 10 is an initialization action. Step 11 judges whether the function call graph is empty. If it is idling step 12, it means that the analysis and division algorithm ends. Otherwise, go to step 13. Step 12 outputs the analysis results for use by analysts. Step 13 judges whether the function call graph is connected. If connected, go to step 16, otherwise go to step 14. Step 14 finds out all disconnected branches of the function call graph. Step 15 cyclically analyzes each connected branch of the function call graph. The analysis process is the same as analyzing the entire function call graph. And it prompts the analyst that these disconnected branches can be processed in parallel. Step 16 judges whether there is a node in the function call graph that does not depend on other nodes, that is, a node with an out-degree of 0. In a directed graph, the out-degree of a no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A systematic method for analyzing and dividing a covert channel comprises the following steps: Step 10: initializing operation; Step 11: determining whether function call graph is null, turning to Step 12 and indicating that the analytical partitioning algorithm is ended if the function call graph is null, otherwise turning to Step 13; Step 12: outputting the analytical results; Step 13: determining whether the function call graph is connected; Step 14: finding out all disconnected branches of the function call graph; Step 15: circularly analyzing each connected branch of the function call graph; Step 16: determining whether nodes which are independent of other nodes exist in the function call graph; Step 18: deleting the nodes the outdegree of which is zero from the function call graph and adding the nodes at the end of a result linked list; Step 19: determining whether a maximum strongly connected subgraph exists in the function call graph, if so, turning to Step 1a, otherwise turning to Step 11; Step 1a: finding the maximum strongly connected subgraph from the function call graph; Step 1b: deleting the maximum strongly connected subgraph; Step 1c: ending operation.

Description

technical field [0001] The invention relates to a system analysis and division method for covert channel analysis used in high-level security systems. Background technique [0002] Covert channel analysis is an indispensable link in the development of high-level security systems, and covert channel analysis of source code is an important means. As the scale and complexity of systems continue to increase, the scale of the source code analysis problem makes the job increasingly difficult in the face of huge systems. Therefore, there is a need for a method to analyze and divide the source code of the system to reduce the scale of the analysis work. [0003] In the system source code, function is the basic unit of analysis. By analyzing the mutual call relationship between functions, we can find the dependency relationship between functions (calling and called relationship between functions), and divide the system accordingly, which can be Subsequent covert channel analysis pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
Inventor 曾庆凯支雷磊
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products