Oracle attacks and covert channels

  • Authors:
  • Ilaria Venturini

  • Affiliations:
  • c/o Laboratoire des Signaux et Systèmes (LSS), École Supérieure d’Électricité (Supélec), École Nationale Supérieure des Télécommunications ( ...

  • Venue:
  • IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name oracle channels. By exploiting information-theoretic notions, we show how to modify detection/authentication watermarking algorithms in order to counteract oracle attacks. We present three proposals, one based on randomization, another one based on time delay and a third one based on both randomization and delay.