Proceedings of the 2017 International Conference on Cryptography, Security and Privacy 2017
DOI: 10.1145/3058060.3058082
|View full text |Cite
|
Sign up to set email alerts
|

Covert Channel over Network Time Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Covert Communication and Its Game Method. Covert communication can be divided into storage type and time type, which are usually based on first-order morphological parameters and second-order statistical characteristics [14][15][16][17]. The covert storage channel [18,19] takes the object of the protocol as a symbol to transmit covert information, such as unused or reserved elements in data packets, data frames, and data segments.…”
Section: Related Workmentioning
confidence: 99%
“…Covert Communication and Its Game Method. Covert communication can be divided into storage type and time type, which are usually based on first-order morphological parameters and second-order statistical characteristics [14][15][16][17]. The covert storage channel [18,19] takes the object of the protocol as a symbol to transmit covert information, such as unused or reserved elements in data packets, data frames, and data segments.…”
Section: Related Workmentioning
confidence: 99%
“…The design and the implementation of covert channels over communication networks represent the most prolific field. According to [15], all the protocols in the TCP/IP stack have been considered in setting up covert channels. In [12,16], vulnerabilities in the headers of the network protocols are used to set up storage-based covert channels.…”
Section: Related Workmentioning
confidence: 99%
“…A CTC can leak covert message via modulating target timing behavior. Most CTCs are established over end-to-end communication, like HTTP, 13,34 secure shell (SSH), network time protocol (NTP), 35 or other TCP-based protocols. 36 With the rising popularity of instant message applications, CTCs are proposed for applications like Skype, 10 WeChat, and others.…”
Section: Related Workmentioning
confidence: 99%