[1] |
LIU J Y , FANG Y J , ZHANG D H . PROFIBUS-DP and HART protocol conversion and the gateway development[A]. Proceeding of 2nd IEEE Conference on Industrial Electronics and Applications(ICIEA)[C]. Harbin,China. 2007, 15--20.
|
[2] |
DONG G S , LIU ZH J , ZHAO D . A security domain isolation and data exchange system based on VMM[A]. Proceeding of 3rd International Conference on Signal Processing and Communication Systems (ICSPCS)[C].. Omaha,NE,USA 2009. 1-5.
|
[3] |
DU J , LIU P P . Design and implementation of efficient one-way isolation system based on PF_RING[A]. Proceeding of 2012 Fourth International Conference on Multimedia Information Networking and Security(MINES)[C]. Nanjing,China, 2012. 105-108.
|
[4] |
LAMPSON B W . A note on the confinement problem[J]. Communications of the ACM. 1973,16(10): 613-615.
|
[5] |
National Computer Security Center,DoD,Trusted Computer System Evaluation Criteria[R]. National Computer Security Center,Washington,DC,USA, 1985.
|
[6] |
ZHAI G S , ZHANG Y F , LIU C Y ,et al. Automatic identification of covert channels inside linux kernel based on source codes[A]. Proceedings of the 2nd International Conference on Interaction Sciences:Information Technology,Culture and Human (ICIS’09)[C]. Seoul,Korea, 2009. 440-445.
|
[7] |
MOSKOWITZ S I , NEWMAN R E , CREPEAU P D ,et al. Covert channels and anonym zing networks[A]. Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society[C]. New York,NY,USA, 2013. 79-88.
|
[8] |
WANG Y , FERRAIUOLO A , SUH G E . Timing channel protection for a shared memory controller[A]. Proceeding of 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)[C]. Orlando,FL,USA, 2014. 225-236.
|
[9] |
JI L P , JIANG W H , DAI B Y . A novel covert channel based on length of messages[A]. Proceedings of International Symposium on Information Engineering and Electronic Commerce (IEEC '09)[C]. Ternopil,Ukraine, 2009. 551-554.
|
[10] |
LI S , EPHREMIDES A . A covert channel in mac protocols based on splitting algorithms[A]. Proceeding of Wireless Communications and Networking Conference[C]. New Orleans,LA,USA, 2005. 1168-1173.
|
[11] |
QU H P , SU P R , FENG D G . A typical noisy covert channel in the IP protocol[A]. Proceeding of 38th Annual 2004 International Carnahan Conference on Security Technology[C]. Albuquerque,NM,USA, 2004. 189-192.
|
[12] |
WANG Z H , LEE R B . Covert and side channels due to processor architecture[A]. Proceedings of 22nd Annual Computer Security Applications Conference (ACSAC ’06)[C]. Miami Beach,FL,USA. 2006. 293-302.
|
[13] |
M.A.PADLIPSKY M A , SNOW D W , KARGER P A . Limitations of End-to-End Encryption in Secure Computer Networks[R]. ESDTR-78-158,Mitre Corporation,August 1978.
|
[14] |
GENNUSO K . Disconnect from the Internet -Whale's e-Gap In-Depth.GSEC Practical Assignment Version 1.2f[S]. 2001.
|
[15] |
LINDSKOG S , GRINNEMO K J , BRUNSTROM A . Data protection based on physical separation:concepts and application scenarios[A]. Proceedings of the 2005 International Conference on Computational Science and Its Applications(ICCSA'05)[C].Singapore. 2005. 1331-1340.
|
[16] |
WU H Y , TAN C X , WANG H H . Building a high-performance communication framework for network isolation system[A]. Proceedings of IEEE International Conference on Networking,Sensing and Control(ICNSC)[C]. Sanya,China, 2008. 1086-1091.
|
[17] |
方勇, 刘嘉勇 . 信息系统安全导论[M]. 北京: 电子工业出版社, 2003. FNAG Y , LIU J Y . Introduction to Information System Security[M]. Beijing: Publishing House of Electronics IndustryPress, 2003.
|
[18] |
YU S S , PENG Y , ZHAN Y J ,et al. Session mechanism research based on agent in NetGAP[A]. Proceedings of International Symposium on Intelligent Information Technology Application Workshops(IITAW’08)[C]. Shanghai,China, 2008. 395-398
|
[19] |
章思宇, 邹福泰, 王鲁华 等. 基于 DNS 的隐蔽通道流量检测[J]. 通信学报, 2013,34(5): 143-151. ZHANG S Y , ZOU F T , WANG N H ,et al. Detecting DNS-based covert channel on live traffic[J]. Journal on Communications, 2013,34(5): 143-151.
|
[20] |
GIRLING C . Covert channels in LAN's[J]. IEEE Transactions on Software Engineering, 1987,13(2): 292-296.
|
[21] |
钱玉文, 李勇, 王执铨 . 网络包长度隐蔽信道的建模与仿真[J]. 系统仿真学报, 2010,22(7): 1773-1781. QIAN Y W , LI Y , WANG Z Q . Modeling and simulation of covert channel based on network packet length[J]. Journal of System Simulation, 2010,22(7): 1773-1781.
|
[22] |
OMAR S N , AHMEDY I , NGADI M A . Indirect DNS covert channel based on name reference for minima length distribution[A]. Proceedings of International Conference on Information Technology and Multimedia (ICIM)[C].Kuala Lumpur,Malaysia. 2011. 1-6.
|
[23] |
SPIVEY J M.The Z Notation:A Reference Manual . International Series in Computer Science[M]. Prentice-Hall,New York,NY,USA. 1992.
|
[24] |
WANG P , LIU S S , YAN L X ,et al. Net gap among different security level networks[A]. Proceedings of 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES)[C]. Nanjing,China, 2012. 4-7.
|
[25] |
YU S S , ZHAN Y J , CAI Q L ,et al. A Reflective NetGAP logic framework design[A]. Proceeding of Workshop on Power Electronics and Intelligent Transportation System(PEITS '08)[C]. 2008. 565-568.
|