2011 4th IFIP International Conference on New Technologies, Mobility and Security 2011
DOI: 10.1109/ntms.2011.5720645
|View full text |Cite
|
Sign up to set email alerts
|

OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…However, it incurs additional traffic overhead and is time-consuming. Studies [3], [6] utilize stack-overflow attacks and address space layout randomization on Linux to transmit different file formats. The sender attempts to guess the delta_mmap memory (16 bits) while one entity indirectly sends files to another entity through a server located on the same machine.…”
Section: Related Work a Relevant Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it incurs additional traffic overhead and is time-consuming. Studies [3], [6] utilize stack-overflow attacks and address space layout randomization on Linux to transmit different file formats. The sender attempts to guess the delta_mmap memory (16 bits) while one entity indirectly sends files to another entity through a server located on the same machine.…”
Section: Related Work a Relevant Studiesmentioning
confidence: 99%
“…In this study, throughput refers to the number of bits sent via the covert channel per second. The time it takes for data to be transmitted through our covert channel is the subject of our paper, referred to as 'time' [3], [6], [13], [14].…”
Section: A Experiments Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…The most important three categories of covert channels are storage covert channels, timing covert channels, and behaviorbased covert channels [3,8,9,10]. Fig.…”
Section: B Covert Channel Typesmentioning
confidence: 99%
“…As a result, they are more difficult to avoid and detect: identifying the message in a covert channel requires complete understanding of the application. Tamer Fatayer et al [4,9,12], proposed behavior based channel through exploiting memory address in Linux operating system, where this channel change the behavior of using system calls and redirect the system call to malicious code implement by attacker to perform specific tasks.…”
Section: ) Storage Covert Channelsmentioning
confidence: 99%