Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data

Transactions on Dependable and Secure Computing. Bd. 0. IEEE 2024 S. 1 - 18

Erscheinungsjahr: 2024

Publikationstyp: Zeitschriftenaufsatz

Sprache: Englisch

Doi/URN: 10.1109/tdsc.2024.3410679

Volltext über DOI/URN

GeprüftBibliothek

Inhaltszusammenfassung


Covert channels are stealthy communication channels that enable manifold adversary and legitimate scenarios, ranging from stealthy malware communications to the exchange of confidential information by journalists. We present DYST, which represents a new class of covert channels we call history covert channels jointly with the new paradigm of covert channel amplification. All covert channels described until now need to craft seemingly legitimate flows or need to modify third-party flows, mim...Covert channels are stealthy communication channels that enable manifold adversary and legitimate scenarios, ranging from stealthy malware communications to the exchange of confidential information by journalists. We present DYST, which represents a new class of covert channels we call history covert channels jointly with the new paradigm of covert channel amplification. All covert channels described until now need to craft seemingly legitimate flows or need to modify third-party flows, mimicking unsuspicious behavior. In contrast, history covert channels can communicate by pointing to unaltered legitimate traffic created by regular network nodes. Only a negligible fraction of the covert communication process requires the transfer of actual covert channel information by the covert channel's sender. This information can be sent through different protocols/channels. This allows an amplification of the covert channel's message size, i.e., minimizing the fraction of actually transferred secret data by a covert channel's sender in relation to the overall secret data being exchanged. Further, we extend the current taxonomy for covert channels to show how history channels can be categorized. We describe multiple scenarios in which history covert channels can be realized, analyze the characteristics of these channels, and show how their configuration can be optimized. » weiterlesen» einklappen

  • Verdeckter Kanal
  • Information Hiding
  • Covert Channel
  • Steganography
  • Information Security
  • Network Security
  • Covert Channels
  • Data Security
  • Data Leakage
  • Data Protection
  • Confidentiality
  • IT-Sicherheit
  • IT-Security
  • Cyber Security
  • Netzwerksicherheit
  • Netzwerke
  • TCP/IP
  • ARP
  • Datenexfiltration
  • History Covert Channel

Autoren


Schmidbauer, Tobias (Autor)
Keller, Jörg (Autor)

Klassifikation


DFG Fachgebiet:
Informatik

DDC Sachgruppe:
Informatik

Verbundene Forschungsprojekte


Verknüpfte Personen