The distinction between a covert storage channel and a covert timing channel is not clear-cut. Every timing channel can be transformed into an equivalent storage channel. Explain how this transformation could be done.
What will be an ideal response?
Covert channels typically require access to a shared clock to time when bits become available in the covert resource and when bits can be replaced. Thus, even with pure storage channels, there is an element of timing.
A covert timing channel works by modulating the time at which something occurs. But the something (which might be an interrupt or access to the CPU or unlocking a semaphore, for example) is itself a resource (the interrupt, the processing, or the semaphore), represented by a storage table entry. Thus, the table entry or the something itself becomes the shared resource visible to the two cooperating processes from which the covert channel is built
You might also like to view...
What four parameters are used to characterize a VBR flow?
What will be an ideal response?
While travelling internationally with a GSM phone, you can pop in a SIM card for the country you're currently in, rather than get a new phone.
Answer the following statement true (T) or false (F)