2014
DOI: 10.2478/s13537-014-0205-6
|View full text |Cite
|
Sign up to set email alerts
|

Covert channels in TCP/IP protocol stack - extended version-

Abstract: We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack.Techniques are organized according to affected layer and protocol. For most of the covert channels its data bandwidth is given. IntroductionAn overt channel is a communication channel within a computer system or network, designed for the authorized transfer of data. A covert channel (first introduced by Lampson [62]), on the other hand, is any communication channel that can be exploited by a process to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(23 citation statements)
references
References 55 publications
0
16
0
1
Order By: Relevance
“…It is always classified by the employed carrier; the most popular type of covert channels is network covert channels, which is based on network traffic; information is embedded by manipulating the packet timing information [1][2][3][4] or pudding some bits into the packet headers [5]. As the youngest branch of covert channels, wireless covert channel conceals the very existence of secret information by modulating it into the delivered wireless signal [6] or modifying some redundant fields of wireless communication protocols [7].…”
Section: Introductionmentioning
confidence: 99%
“…It is always classified by the employed carrier; the most popular type of covert channels is network covert channels, which is based on network traffic; information is embedded by manipulating the packet timing information [1][2][3][4] or pudding some bits into the packet headers [5]. As the youngest branch of covert channels, wireless covert channel conceals the very existence of secret information by modulating it into the delivered wireless signal [6] or modifying some redundant fields of wireless communication protocols [7].…”
Section: Introductionmentioning
confidence: 99%
“…Dalam segi ini lah aplikasi yang dibangun membutuhkan sebuah peranan transmisi pada protokol tcp/ip [1], [2]. Pada dasarnya transmisi tcp/ip sangat beragam, serta bersifat rahasia maupun terbuka.…”
Section: Pendahuluanunclassified
“…Covert channels can broadly be classified as storage or timing channels. In storage channels, the source app directly or indirectly writes to a shared resource, which the sink app reads; in timing channels, the source app exploits the ability to influence timing properties of the system that the sink app can observe [22,32]. The covert channel that we study in this paper is a storage channel: the source app affects the temperature that the sink app can observe.…”
Section: Background and Related Workmentioning
confidence: 99%
“…We study a family of storage covert channels [22,32] where a source and a sink app share a multicore processor and covertly communicate through the on-chip temperature sensors. Assuming that the source app runs on core n, we can define at least as many channels as there are temperature sensors.…”
Section: Communication Channel Modelmentioning
confidence: 99%