The distinction between a covert storage channel and a covert timing channel is not clear-cut. Every timing channel can be transformed into an equivalent storage channel. Explain how this transformation could be done.

What will be an ideal response?

Covert channels typically require access to a shared clock to time when bits become available in the covert resource and when bits can be replaced. Thus, even with pure storage channels, there is an element of timing.

A covert timing channel works by modulating the time at which something occurs. But the something (which might be an interrupt or access to the CPU or unlocking a semaphore, for example) is itself a resource (the interrupt, the processing, or the semaphore), represented by a storage table entry. Thus, the table entry or the something itself becomes the shared resource visible to the two cooperating processes from which the covert channel is built

Computer Science & Information Technology

You might also like to view...

What four parameters are used to characterize a VBR flow?

What will be an ideal response?

Computer Science & Information Technology

While travelling internationally with a GSM phone, you can pop in a SIM card for the country you're currently in, rather than get a new phone.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology