Covert messaging through TCP timestamps

  • Authors:
  • John Giffin;Rachel Greenstadt;Peter Litwack;Richard Tibbetts

  • Affiliations:
  • Massachusetts Institute of Technology;Massachusetts Institute of Technology;Massachusetts Institute of Technology;Massachusetts Institute of Technology

  • Venue:
  • PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Covert channels exist in most communications systems and allow individuals to communicate truly undectably. However, covert channels are seldom used due to their complexity. A protocol for sending data over a common class of low-bandwidth covert channels has been developed. The protocol is secure against attack by powerful adversaries. The design of a practical system implementing the protocol on a standard platform (Linux) exploiting a channel in a common communications system (TCP timestamps) is presented. A partial implementation of this system has been accomplished.