Introduction to Coding Theory
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Information Theory, Inference & Learning Algorithms
Information Theory, Inference & Learning Algorithms
IP covert timing channels: design and detection
Proceedings of the 11th ACM conference on Computer and communications security
Operating system support for planetary-scale network services
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Detecting covert timing channels: an entropy-based approach
Proceedings of the 14th ACM conference on Computer and communications security
Network covert channels: design, analysis, detection, and elimination
Network covert channels: design, analysis, detection, and elimination
Model-Based Covert Timing Channels: Automated Modeling and Evasion
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hide and seek in time: robust covert timing channels
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Robust and undetectable steganographic timing channels for i.i.d. traffic
IH'10 Proceedings of the 12th international conference on Information hiding
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
An information-theoretic and game-theoretic study of timing channels
IEEE Transactions on Information Theory
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
Hi-index | 0.00 |
In this paper, we propose CoCo, a novel framework for establishing covert timing channels. The CoCo covert channel modulates the covert message in the inter-packet delays of the network flows, while a coding algorithm is used to ensure the robustness of the covert message to different perturbations. The CoCo covert channel is adjustable: by adjusting certain parameters one can trade off different features of the covert channel, i.e., robustness, rate, and undetectability. By simulating the CoCo covert channel using different coding algorithms we show that CoCo improves the covert robustness as compared to the previous research, while being practically undetectable.