ABSTRACT
The problem of covert communication via computer systems is almost as old as the problem of computer security itself. In the earliest years, covert communication was seen as mainly as a theoretical problem. But as computer systems have become more complex and ubiquitous, covert communication has begun to see practical use, particularly in the last two decades (see, e.g. Mazurcyk et al. in [MW19].) In this talk I will be reporting on the work we have been doing at NRL on evaluating the impact that existing research on the asymptotic behavior on covert channels has on embeddings in real-world channels.
- Bash, Boulat A., Dennis Goeckel, and Don Towsley. "Limits of reliable communication with low probability of detection on AWGN channels." IEEE journal on selected areas in communications 31, no. 9 (2013): 1921--1930.Google Scholar
- B. A. Bash, A. H. Gheorghe, M. Patel, J. L. Habif, D. Goeckel, D. Towsley, and S. Guha, "Quantum-secure covert communication on bosonic channels," Nat. Commun., vol. 6, Oct. 2015Google Scholar
- Mazurczyk, Wojciech, Krystian Powójski, and Luca Caviglione. "IPv6 covert channels in the wild." In Proceedings of the Third Central European Cybersecurity Conference, pp. 1--6. 2019.Google Scholar
- Pfitzmann, Birgit. "Information hiding terminology." In Information Hiding: First International Workshop Proceedings, 1996. Springer, 1996.Google Scholar
- Ker, A. D., Pevný, T., Kodovský, J., & Fridrich, (2008, September). The square root law of steganographic capacity. In Proceedings of the 10th ACM workshop on Multimedia and security (pp. 107--116).Google ScholarDigital Library
- Ker, A. D., Pevný, T., Kodovský, J., & Fridrich, (2008, September). The square root law of steganographic capacity. In Proceedings of the 10th ACM workshop on Multimedia and security (pp. 107--116).Google ScholarDigital Library
- Wilson, Alex, and Andrew D. Ker. "Avoiding detection on twitter: embedding strategies for linguistic steganography." Electronic Imaging 2016, no. 8 (2016): 1--9.Google ScholarCross Ref
Index Terms
- Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results
Recommendations
Out-of-Band Covert Channels—A Survey
A novel class of covert channel, out-of-band covert channels, is presented by extending Simmons’ prisoners’ problem. This new class of covert channel is established by surveying the existing covert channel, device-pairing, and side-channel research. ...
A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels
IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia SecurityNew viewpoints of covert channels are presented in this work. First, the origin of covert channels is traced back to acc ess control and a new class of covert channel, air-gap covert channels, is presented. Second, we study the design of covert channels ...
Towards Reversible Storage Network Covert Channels
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityThe use of network covert channels to improve privacy or support security threats has been widely discussed in the literature. As today, the totality of works mainly focuses on how to not disrupt the overt traffic flow and the performance of the covert ...
Comments