2022
DOI: 10.13052/jcsm2245-1439.1123
|View full text |Cite
|
Sign up to set email alerts
|

The Threat of Covert Channels in Network Time Synchronisation Protocols

Abstract: Synchronized clocks are vital for most communication scenarios in networks of Information Technology (IT) and Operational Technology (OT). The process of time synchronisation requires transmission of high-precision timestamps often originating from external sources. In this paper, we analyze how time synchronization protocols impose a threat by being leveraged as carrier for network covert channels. This paper is an extended version version of our open-access paper [15] in which we performed an in-depth analys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The complete transfer of the text (169kb) takes roughly 12 hours in the test environment (256 bit per UID, 62 seconds between time requests using chrony). First tests with statistical methods (entropy, runs-test, chi-squared) and rand-test 9 we were not able to differentiate between original and embedded UIDs. In the following, we describe how to overcome this issue and design an active warden, capable of mitigating the covert channels described in this paper.…”
Section: Nts-uid Covert Channel Design and Proof-of-conceptmentioning
confidence: 98%
See 4 more Smart Citations
“…The complete transfer of the text (169kb) takes roughly 12 hours in the test environment (256 bit per UID, 62 seconds between time requests using chrony). First tests with statistical methods (entropy, runs-test, chi-squared) and rand-test 9 we were not able to differentiate between original and embedded UIDs. In the following, we describe how to overcome this issue and design an active warden, capable of mitigating the covert channels described in this paper.…”
Section: Nts-uid Covert Channel Design and Proof-of-conceptmentioning
confidence: 98%
“…With the decrypted client-to-server 𝐾 𝐶2𝑆 the server verifies the signature of the NTS time request (8). The server generates a NTP response (9), inserts the same Unique Identifier from the request, generates and encrypts new cookies using its secret server key 𝐾 𝑆 (10) and inserts these into the NTS response (11). To secure the transmission, the new cookies are encrypted using the server-to-client key 𝐾 𝑆2𝐶 (12) (so that only the authenticated client can decrypt the cookies).…”
Section: Nts Key Establishment (Nts-ke) the Process Of Nts Keymentioning
confidence: 99%
See 3 more Smart Citations