Key Technologies and Improvement of Identifying Covert Channels in Source Code

支雷磊,王佳,曾庆凯
DOI: https://doi.org/10.16183/j.cnki.jsjtu.2009.01.023
2009-01-01
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University
Abstract:The key technologies of identifying covert channel in source code, including data-flow analysis, alias analysis and information-flow-security analysis were discussed. By summarizing and optimizing various technologies, an improved approach composed of architecture analysis, alias analysis, information-flow analysis and security identification was presented. A prototype of the approach was implemented using abstract syntax tree and control flow graph which are generated by GCC. The experimental results show that the efficiency and precision of covert-channel identification are improved.
What problem does this paper attempt to address?