Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels

Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels

Bilal Shebaro, Fernando Pérez-González, Jedidiah R. Crandall
Copyright: © 2013 |Volume: 5 |Issue: 1 |Pages: 16
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466631168|DOI: 10.4018/jdcf.2013010104
Cite Article Cite Article

MLA

Shebaro, Bilal, et al. "Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels." IJDCF vol.5, no.1 2013: pp.54-69. http://doi.org/10.4018/jdcf.2013010104

APA

Shebaro, B., Pérez-González, F., & Crandall, J. R. (2013). Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels. International Journal of Digital Crime and Forensics (IJDCF), 5(1), 54-69. http://doi.org/10.4018/jdcf.2013010104

Chicago

Shebaro, Bilal, Fernando Pérez-González, and Jedidiah R. Crandall. "Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels," International Journal of Digital Crime and Forensics (IJDCF) 5, no.1: 54-69. http://doi.org/10.4018/jdcf.2013010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Timing inference channels are a well-studied area of computer security and privacy research, but they have not been widely applied in digital forensic applications. Timing signatures (for example, of movies) are not robust against variations in the machine, the encoder, the environment, and other factors that affect timing, and unfortunately such issues have limited many researchers from using timing inference channels for revealing hidden data, detecting machine behavior, or even forensic analysis. The authors develop a geometrical interpretation in a high dimensional space of timing signatures for movies as an example of pattern-like software. The results suggest that timing signatures can be made robust against different machines, different encoders, and other environmental conditions by exploiting geometrical structure in this space. This geometrical structure helps identify the behavior of running pattern-like software that is useful for identifying digital crimes, privacy invasion matters, and network behaviors. This paper is focused on a thought experiment: how much information can an unprivileged process learn by just running on a system and observing its own timing? Although installing administrative software is the most frequent approach for understanding system behavior and detecting running software, the results show that it is feasible that such goals could be still achieved without any administrative privileges.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.