Thanks for the comments.
Beyond this, and assuming the correct implementation of the above,
we're into the grounds of classic trusted OS covert channel analysis,
against which no COTS UNIX OSes I'm aware of are hardened. This isn't to
dismiss these attacks as purely hypothetical -- we've
I still think my definitions of covert channel vs side channel
better reflect accepted usage these days, but whatever. I don't
have any great desire to debate the definitions. That doesn't seem
like a good use of everyone's time.
I was trying to define some shorthand to more concisely make my
2 matches
Mail list logo