2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5962718
|View full text |Cite
|
Sign up to set email alerts
|

A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis

Abstract: A covert channel is a communication channel that bypasses the access controls of the system, and it is a threat to the system's security. In this paper, we propose a new covert timing channel which exploits the algorithmic complexity vulnerabilities in the name lookup algorithm of the kernel. This covert channel has a high capacity and it is practically exploitable. In our experiments, the data rate reaches 2256 bps under a very low error rate. This data rate is high enough for practical use. So our covert cha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…In most of these works, weak non-cryptographic hash functions were responsible for the attacks. The general impact of these attacks was DoS [39] or the creation of covert channels [40]. Our work contributes to algorithmic complexity attacks in three aspects.…”
Section: Related Workmentioning
confidence: 99%
“…In most of these works, weak non-cryptographic hash functions were responsible for the attacks. The general impact of these attacks was DoS [39] or the creation of covert channels [40]. Our work contributes to algorithmic complexity attacks in three aspects.…”
Section: Related Workmentioning
confidence: 99%