2016
DOI: 10.1145/2938370
|View full text |Cite
|
Sign up to set email alerts
|

Out-of-Band Covert Channels—A Survey

Abstract: A novel class of covert channel, out-of-band covert channels, is presented by extending Simmons' prisoners' problem. This new class of covert channel is established by surveying the existing covert channel, device pairing and side channel research. Terminology as well as a taxonomy for out-of-band covert channels is also given. Additionally, a more comprehensive adversarial model based on a knowledgeable passive adversary and a capable active adversary is proposed in place of the current adversarial model, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(10 citation statements)
references
References 111 publications
(114 reference statements)
0
10
0
Order By: Relevance
“…Covert channels have been proposed for several domains. For instance, Carrara and Adams surveyed out-of-band covert channels over physical media, such as light, sound and air [13] while other authors analyzed details of such channels, e.g., Hanspach and Goetz [14], Cronin et al [15] and Matyunin et al [16]. Network covert channel techniques have been summarized by Mazurczyk et al [17], Wendzel et al [9] and Zander et al [18].…”
Section: Related Workmentioning
confidence: 99%
“…Covert channels have been proposed for several domains. For instance, Carrara and Adams surveyed out-of-band covert channels over physical media, such as light, sound and air [13] while other authors analyzed details of such channels, e.g., Hanspach and Goetz [14], Cronin et al [15] and Matyunin et al [16]. Network covert channel techniques have been summarized by Mazurczyk et al [17], Wendzel et al [9] and Zander et al [18].…”
Section: Related Workmentioning
confidence: 99%
“…In particular, Lampson defined covert channels as ''channels not intended for information transfer at all''. Similarly, the US Department of Defence (DoD) define covert channels as ''any communication channels that can be exploited by a process to transfer information in a manner that violates the system's security policy'' [10]. According to the 'Orange Book' [11] of the US DoD, system developers shall conduct a thorough search for covert channels and make a determination, either by actual measurement or by engineering estimation, of the maximum bandwidth of each identified channel.…”
Section: Related Workmentioning
confidence: 99%
“…Side-channels can also be used for covert communication and collusion [26] , [28] [30] . These variously employ modulation in domains such as those resulting from wavelet or cosine transforms, modulation techniques such as phase modulation and spread spectrum, recovery strategies such as blind detection, and encoding the side-channel to resist attempts to destroy it [31] .…”
Section: Side-channel Attacks In Cybmentioning
confidence: 99%