skip to main content
10.1145/3508398.3516669acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
keynote

Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results

Published:15 April 2022Publication History

ABSTRACT

The problem of covert communication via computer systems is almost as old as the problem of computer security itself. In the earliest years, covert communication was seen as mainly as a theoretical problem. But as computer systems have become more complex and ubiquitous, covert communication has begun to see practical use, particularly in the last two decades (see, e.g. Mazurcyk et al. in [MW19].) In this talk I will be reporting on the work we have been doing at NRL on evaluating the impact that existing research on the asymptotic behavior on covert channels has on embeddings in real-world channels.

References

  1. Bash, Boulat A., Dennis Goeckel, and Don Towsley. "Limits of reliable communication with low probability of detection on AWGN channels." IEEE journal on selected areas in communications 31, no. 9 (2013): 1921--1930.Google ScholarGoogle Scholar
  2. B. A. Bash, A. H. Gheorghe, M. Patel, J. L. Habif, D. Goeckel, D. Towsley, and S. Guha, "Quantum-secure covert communication on bosonic channels," Nat. Commun., vol. 6, Oct. 2015Google ScholarGoogle Scholar
  3. Mazurczyk, Wojciech, Krystian Powójski, and Luca Caviglione. "IPv6 covert channels in the wild." In Proceedings of the Third Central European Cybersecurity Conference, pp. 1--6. 2019.Google ScholarGoogle Scholar
  4. Pfitzmann, Birgit. "Information hiding terminology." In Information Hiding: First International Workshop Proceedings, 1996. Springer, 1996.Google ScholarGoogle Scholar
  5. Ker, A. D., Pevný, T., Kodovský, J., & Fridrich, (2008, September). The square root law of steganographic capacity. In Proceedings of the 10th ACM workshop on Multimedia and security (pp. 107--116).Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ker, A. D., Pevný, T., Kodovský, J., & Fridrich, (2008, September). The square root law of steganographic capacity. In Proceedings of the 10th ACM workshop on Multimedia and security (pp. 107--116).Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Wilson, Alex, and Andrew D. Ker. "Avoiding detection on twitter: embedding strategies for linguistic steganography." Electronic Imaging 2016, no. 8 (2016): 1--9.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy
      April 2022
      392 pages
      ISBN:9781450392204
      DOI:10.1145/3508398

      Copyright © 2022 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 April 2022

      Check for updates

      Qualifiers

      • keynote

      Acceptance Rates

      Overall Acceptance Rate149of789submissions,19%

      Upcoming Conference

      CODASPY '24
    • Article Metrics

      • Downloads (Last 12 months)16
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader