Covert Channels through External Interference

نویسنده

  • Gaurav Shah
چکیده

This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require the ability to send messages on the network, but only needs the ability to jam traffic for short intervals. We describe an implementation of a wireless interference channel for 802.11 networks that can be used to superimpose low bandwidth messages over data streams, even when the network is encrypted or has other access controls. This channel is particularly well suited to watermarking VoIP flows, without compromising any routers or endpoint hosts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert channel detection using Information Theory

This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels. We then show that even an enhanced notion of “iterated multivalued interference” can not capture flows with capacity lower than one bit of information per channel use. We t...

متن کامل

A Note regarding Covert Channels

This note presents an overview of some abstract concepts regarding covert channels. It discusses primary means of synchronization and illicit interference between subjects in a multilevel computing environment, and it describes a detailed laboratory exercise utilizing these abstractions.

متن کامل

New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation

In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classification of covert channels based on our analysis. Unlike the non-interference approaches, our approach is constructive, allowing the direct examination of system architectures at different abstraction levels for the pres...

متن کامل

Covert Channel Synthesis for Transducers

Covert channels are a security threat for information systems, since they permit illegal flows, and sometimes leaks, of classified data. Although numerous descriptions have been given at a concrete level, relatively little work has been carried out at a more abstract level, outside probabilistic models. In this paper, we propose a definition of covert channels based on encoding and decoding bin...

متن کامل

Covert Channels with Sequential Transducers⋆

Covert channels represent a security problem for information systems, since they permit illegal flows and sometimes leaks of classified data. Although numerous descriptions have been given at a concrete level, relatively few work has been carried out at a more abstract level. In this paper, we propose a definition for covert channels based on encoding and decoding binary messages with transduce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009