Show simple item record

dc.contributor.authorNguyen, Thuy D.
dc.dateJanuary 2015
dc.date.accessioned2015-02-26T18:15:08Z
dc.date.available2015-02-26T18:15:08Z
dc.date.issued2015-01
dc.identifier.urihttps://hdl.handle.net/10945/44707
dc.description.abstractCovert channel analysis is a critical, yet challenging, security engineering task. Despite numerous descriptions of covert channel attacks on ground-based systems and networks, such attacks have not been examined in the context of data bus protocols used in commercial space platforms hosting government payloads. Our contribution is to identify relevant concerns that have yet to be addressed in this domain, largely due to the lack of security requirements for hosted payload space applications. In this paper, we describe a policy-driven threat model and then develop hypothetical attack scenarios in the context of the MIL-STD-1553B protocol. Our initial analysis identifies several covert timing and storage channels.en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleTowards MIL-STD-1553B covert channel analysisen_US
dc.typeTechnical Reporten_US
dc.contributor.departmentCyber Academic Group
dc.subject.authorCovert channelen_US
dc.subject.authorcross domainen_US
dc.subject.authormultilevel securityen_US
dc.subject.authorMIL-STD-1553Ben_US
dc.description.funderCyber Academic Group at the Naval Postgraduate School.en_US
dc.identifier.npsreportNPS-CAG-15-001
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record