Covert Channels
672 Followers
Recent papers in Covert Channels
The concept of covert channels has been visited frequently by academia in a quest to analyse their occurrence and prevention in trusted systems. This has lead to a wide variety of approaches being developed to prevent and identify such... more
“YOU, the U-Bomb, or ‘YOU-Bomb goes Kabloom’: An Essay on Anonymity, Risibility, & Quantum Subjectivity,” published without author page-proofs ∴ with many odd glitches and with sections that had been deleted in the final draft (oh well!)... more
Considering the wide range of functionalities provided by smartphones, smartphone-users’ privacy and security of their personal information is of vital importance. Android has been the most targeted platform for malware attacks,... more
This paper looks at the difficulty in mapping covert networks. Analyzing networks after an event is fairly easy for prosecution purposes. Mapping covert networks to prevent criminal activity is much more difficult. We examine the network... more
Security in building automation systems (BAS) re- cently became a topic in the security community. BAS form a part of enterprise networks and can be utilized to gain access to a company network or to violate a security policy. Up to... more
A methodology for designing content based digital signatures which can be used to authenticate images is presented. A continuous measure of authenticity is presented which forms the basis of this methodology. Using this methodology... more
Malicious actors in the world are using more ingenuity than ever for both data infiltration and exfiltration purposes, also known as command and control communications. In this paper I aim to describe a system that could be used to send... more
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques occurred which are based on the capability of protocol switching. There are currently... more
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the temperature and humidity, as well as the type of crystal. The main... more
Network steganography is a relatively new discipline which studies different steganographic techniques that utilize network protocols for data hiding. Internet of Things (IoT) is a concept which integrates billions of embedded devices... more
ains how roughness is a channel. This experimental research tries to explore (n) by making 8 m length, 40 cm width and 40 cm height laboratory flume with adjustable slope. The flume was used to carry out a total of 72 experiments with 4... more
Network covert channels are policy-breaking and stealthy commu- nication channels in computer networks. These channels can be used to bypass Internet censorship, to exfiltrate data without raising attention, to allow a safe and stealthy... more
Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets.... more
Malicious actors in the world are using more ingenuity than ever for both data infiltration and exfiltration purposes, also known as command and control communications. In this paper I aim to describe a system that could be used to send... more
—Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate λ packets per second for a time period T. Suppose that covert transmitter Alice wishes to... more
In this paper, we present new techniques to detect interposition attacks on stream-based connections in local and wide area networks. The approach developed here is general enough to apply uniformly to all circumstances where the... more
Modern malware is becoming hard to spot since attackers are increasingly adopting new techniques to elude signature-and rule-based detection mechanisms. Among the others, steganography and information hiding can be used to bypass security... more
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the control of media for entertainment, or supporting a remote... more
In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts. Such an approach allows attackers to act in a stealthy manner, for instance,... more
Network covert channels enable hidden commu- nication and can be used to break security policies. Within the last years, new techniques for such covert channels arose, including protocol switching covert channels (PSCCs). PSCCs... more
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze... more
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to... more
Abstract In recent scientific literature, network based steganography is regarded as a new research direction in the paradigm of information hiding. Few approaches have been found which embed secret information by altering the length of... more
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the temperature and humidity, as well as the type of crystal. The main... more
Network covert channels have become a sophisticated means for transferring hidden information over the network. Covert channel-internal control protocols, also called micro protocols, have been introduced in the recent years to enhance... more
Abstract Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address... more
It is possible to enhance our understanding of what has happened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system... more
Modern malware increasingly exploits information hiding or steganography to elude security frameworks and remain unnoticed for long periods. To this aim, a prime technique relies upon the ability of creating covert channels to bypass the... more
Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication... more
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection.... more
Covert channels are an immense cause of security concern because they can be used to pass malicious messages. The messages could be in form of computer virus, spy programs, terrorist messages, etc. Most available techniques proposed... more
Intrusion detection is the method of monitoring the actions taking place in a network and diffracts them for doubtful patterns that may identify a network or system attack from someone trying to violate the system. An intrusion detection... more
The ability of creating covert channels within network traffic is now largely exploited by malware to elude detection, remain unnoticed while exfiltrating data or coordinating an attack. As a consequence, designing a network covert... more
The Flume system is an implementation of decentralized information flow control (DIFC) at the operating system level. Prior work has shown Flume can be implemented as a practical extension to the Linux Operating System, allowing real Web... more
This paper looks at the difficulty in mapping covert networks. Analyzing networks after an event is fairly easy for prosecution purposes. Mapping covert networks to prevent criminal activity is much more difficult. We examine the network... more
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags) are increasingly commonplace in hospitals and many other... more
Covert Channels constitute an important security threat because they are used to ex-filtrate sensitive information, to disseminate malicious code, and, more alarmingly, to transfer instructions to a criminal (or terrorist). This work... more
Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol switch- ing covert channels, and adaptive covert channels. These techniques have in common that they rely on... more
Now a day's there is great attention in the accounting and cyber crime fields because of government regulations in the whole world . Although these regulations force corporations to provide financial transparency, they still commit... more