2022
DOI: 10.56553/popets-2022-0068
|View full text |Cite
|
Sign up to set email alerts
|

Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs

Abstract: Censorship-resistant communication systems generally use real-world cover protocols to establish a covert channel through which uncensored communication can occur. Unfortunately, many previously proposed systems use cover protocols inconsistently with the way humans normally use those protocols, leading to anomalous network traffic patterns that have been shown to be discoverable by real-world censors. In this paper, we argue that censorship-resistant communication systems should follow two behavior-based desi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 32 publications
0
0
0
Order By: Relevance
“…Various systems meeting this signaling channel definition exist: meek and other domain fronting channels achieve this despite not satisfying indirectness; refraction routing approaches use routinglevel indirection [16]; various channels use email [20,32,37]; some use cloud storage services [4]; some use video streaming platforms [23]. A common factor to signaling channel unblockability requirements is a reliance on some existing service that the censor has either not thought to block or finds too costly to block.…”
Section: Signaling Channelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Various systems meeting this signaling channel definition exist: meek and other domain fronting channels achieve this despite not satisfying indirectness; refraction routing approaches use routinglevel indirection [16]; various channels use email [20,32,37]; some use cloud storage services [4]; some use video streaming platforms [23]. A common factor to signaling channel unblockability requirements is a reliance on some existing service that the censor has either not thought to block or finds too costly to block.…”
Section: Signaling Channelsmentioning
confidence: 99%
“…Many existing application tunneling channels do not include any functionality of this sort. However, as recent research shows [32], this can leave a significant gap in security because it causes the cover application usage to be shaped by the user (whether a human or a circumvention application). Breaking this linkage provides behavioral independence [32] and enables evaluating the security of a channel independent of its eventual communications usage.…”
Section: User Models the User Model Component Controls When Andmentioning
confidence: 99%
See 1 more Smart Citation