Proceedings of the 14th International Conference on Availability, Reliability and Security 2019
DOI: 10.1145/3339252.3341493
|View full text |Cite
|
Sign up to set email alerts
|

Towards Reversible Storage Network Covert Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…Network covert channels are hidden communication paths allowing two remote endpoints to exchange information [42]. To this aim, the attacker manipulates specific behaviors of the traffic (e.g., the inter-packet time or the throughput) as to encode a secret [83] or injects a secret in the protocol data unit (e.g., in the unused fields of the header [85] or in the payload field [86]).…”
Section: Network Covert Channelsmentioning
confidence: 99%
“…Network covert channels are hidden communication paths allowing two remote endpoints to exchange information [42]. To this aim, the attacker manipulates specific behaviors of the traffic (e.g., the inter-packet time or the throughput) as to encode a secret [83] or injects a secret in the protocol data unit (e.g., in the unused fields of the header [85] or in the payload field [86]).…”
Section: Network Covert Channelsmentioning
confidence: 99%
“…Being able to deploy wardens for protecting large-scale networks or running sophisticated detection software while delivering satisfactory performances could be unfeasible for small-medium actors. Therefore, a relevant effort should be done to explore Warden-as-a-Service approaches [3,4]; • reversibility: in reversible network covert channels, the two secret endpoints communicating are able to "restore" the traffic to its original form (i.e., before the injection of the hidden data) in order to avoid detection [67,68]. To spot this class of emerging threats, the warden should collect the traffic in different portions of the network and do some form of comparison.…”
Section: Trends and Challengesmentioning
confidence: 99%
“…In man-in-the-middle scenarios, reversibility enables covert receivers to forward non-modified, i.e., innocent, original data to the overt receiver. As shown by Mazurczyk et al, reversibility is feasible for network covert channels: full reversibility refers to covert channels where the original carrier data can be restored completely, while quasireversibility refers to those covert channels that allow only the partial reconstruction of the original data [11]. Different categories of reversible data hiding are feasible.…”
Section: Fundamentalsmentioning
confidence: 99%
“…Different categories of reversible data hiding are feasible. In our case, intrinsic data-hiding is applied, in which the covert receiver is able to achieve full reversibility without guessing (implicit reversibility techniques) or embedding of additional information that describe the original message (explicit reversibility techniques) [11].…”
Section: Fundamentalsmentioning
confidence: 99%
See 1 more Smart Citation