Detecting illicit leakage of information in operating systems

Shiuh-Pyng Shieh*, Virgil D. Gligor

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Scopus citations


In this paper we investigate the illicit means of leaking sensitive or private information in operating systems. The leakage cannot be eliminated either by the use of access control and authentication mechanisms or by administrative measures since unauthorized access need not be attempted. In order to resolve the problem, we designed an audit system which is able to detect the illicit leakage of information. This audit system consists of two major components: an enhanced audit-collection mechanism and an audit-analysis tool.

Original languageEnglish
Pages (from-to)123-148
Number of pages26
JournalJournal of Computer Security
Issue number2-3
StatePublished - 1 Apr 1996


  • Operating system security
  • multi-level secure systems
  • data transmission
  • information flow
  • audit collection
  • analysis


Dive into the research topics of 'Detecting illicit leakage of information in operating systems'. Together they form a unique fingerprint.

Cite this