Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

83 results about "Covert channel" patented technology

In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Lampson, is defined as channels "not intended for information transfer at all, such as the service program's effect on system load," to distinguish it from legitimate channels that are subjected to access controls by COMPUSEC.

Information flow analysis method based on system source code searching concealed channel

The invention provides an information flow analytic method based on the searched convert channels of system source codes, which comprises the following steps: functions in the source codes and the statements and the variables in the functions are identified by dint of lexical analyzers and scanning system source codes; the call relations of the functions are determined, statement tree fields are constructed and functional dependence gathers of each function are given according to the functions and the function call statements identified by scanners; function information flow trees are constructed and are lopped with the statements and the variables which can generate information flow and are identified by the scanners as the input for information flow analysis; the function information flow trees are traversed, and the information flow graphs of each function are output; the shared variable visibility between dependence concentration functions and the modifiability information are acquired in functional dependence gathers according to the functional dependence gathers and the information flow graphs, thus generating shared resource matrices; covert channels are searched with the shared resource matrices as the input, and the covert channel sequences in the system are output. By adopting the information flow analytic method, the search work precision of the covert channels is improved.
Owner:JIANGSU UNIV

Method using multi-dimensional feature vectors to detect IP ID covert channel

The invention discloses a method using multi-dimensional feature vectors to detect an IP ID covert channel. The method comprises the following steps of the feature extracting step 1 of respectively and continuously capturing N IP data packets for normal and abnormal training samples, extracting information of an ID domain of the head of an IP, acquiring the ID difference value of delta id1, delta id2,..., delta idn-1 between adjacent data packets, and carrying out statistics on a mean value E, a standard deviation D and an entropy of the id1, delta id2,..., delta idn-1 to obtain three-dimensional feature vectors, the step 2 of carrying out training on an SVM classifier, repeating the step 1 to obtain a three-dimensional feature vector set of the normal training samples and a three-dimensional feature vector set of the abnormal training samples, and carrying out training on the SVM classifier to obtain a classifying detecting model, and the step 3 of classifying the feature vectors of a channel to be detected through the SVM classifier according to the trained and obtained classifying model. The method is high in detecting efficiency, uses multi-dimensional statistic features as classifying data and improves the detection accuracy.
Owner:SUZHOU INST FOR ADVANCED STUDY USTC

Detection method and detection equipment of hidden channel

The embodiment of the application provides a detection method and detection equipment of a hidden channel. The detection method comprises the following steps: grouping HTTP (Hyper Text Transport Protocol) request flow according to source IP (Internet Protocol) addresses and target IP addresses of messages in the HTTP request flow to obtain at least one group of messages, and executing subsequent steps for a first group of messages: generating a record table corresponding to the first group of messages according to timestamps and HTTP head tags carried by the messages; performing statistics to obtain a feature value of the first group of messages according to the record table corresponding to the first group of messages; and if the feature value of the first group of messages does not belongs to a normal threshold range of the feature value, determining that a Cookie hidden channel exists in the first group of messages, wherein the normal threshold range of the feature value is trained by HTTP request flow in a history time interval. In the embodiment of the application, whether the hidden channel exists in the HTTP request flow within predetermined time or not is judged through normal ranges of feature values of normal messages, so that the detection effectiveness of the HTTP hidden channel is improved.
Owner:HUAWEI TECH CO LTD

Virtual machine simultaneous-locating detection method based on hidden channel under cloud environment

The invention discloses a virtual machine simultaneous-locating detection method based on a hidden channel under a cloud environment. The method includes the steps that (1) a plurality of virtual machine embodiments of the same type are deployed on a cloud platform; (2) the real hidden channel, based on the cloud platform, of virtual machine monitor share resources is selected; (3) two virtual machine embodiments are selected from the virtual machine embodiments and recorded as the virtual machine embodiment A and the virtual machine embodiment B respectively; (4) the virtual machine embodiment A and the virtual machine embodiment B serve as a sender and a receiver of the hidden channel respectively, the hidden channel is used for communication, if the communication succeeds, the virtual machine embodiment A and the virtual machine embodiment B are simultaneously located on a physical machine, and if not, the virtual machine embodiment A and the virtual machine embodiment B are not simultaneously located on the physical machine. By means of the virtual machine simultaneous-locating detection method based on the hidden channel under the cloud environment, efficiency and reliability of the simultaneous-locating detection are improved, excessive dependence on the network is avoided through the hidden channel, and the problem of simultaneous-locating detection is solved on the premise that the performance is not lowered.
Owner:PEKING UNIV

Method for building covert channel with network flow watermarking of forward error correction code and interleaved code

ActiveCN108650054ATroubleshoot transmission correctness issuesVerify reliabilityForward error control useComputer hardwareInformation transmission
The invention discloses a method for building a covert channel with network flow watermarking of a forward error correction code and an interleaved code, and relates to a covert channel for information secure transmission in the field of communication. The method comprises the following steps: firstly, encoding original secret information to be transmitted by an error correction code encoder, andprocessing an obtained codeword signal according to a network flow watermarking method; in a decoding stage, making a secret information receiver acquire a watermark signal from target network stream,and transmit the watermark signal to an interleaved code decoder for processing to obtain a de-transposed watermark signal; if the watermark signal is subjected to PN code spread spectrum processing,processing the watermark signal with a PN decoder; and finally, transmitting the de-transposed watermark signal or the PN decoded watermark signal to an error correction code decoder for processing to recover the original secret information. Through adoption of the method for building the covert channel with network flow watermarking of the forward error correction code and the interleaved code,the automatic error correction capability specific to the secret information is realized, and the reliability of information transmission is enhanced.
Owner:XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products