Article
Engineering, Electrical & Electronic
Shuhong Wu, Yonghong Chen, Hui Tian, Chonggao Sun
Summary: The study proposes a novel CTCs detection method based on time series symbolization, analyzing covert timing channels and conducting experimental research to verify the method's performance.
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY
(2021)
Article
Computer Science, Information Systems
Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, Ghaith Husari
Summary: Covert Timing Channels (CTC) pose a growing threat as data exfiltration increases, with detection now relying on machine learning techniques. An innovative image-based solution has demonstrated remarkable performance, showcasing a detection accuracy of 95.83% for cautious CTCs.
Article
Computer Science, Software Engineering
Luca Caviglione, Andreas Schaffhauser, Marco Zuppelli, Wojciech Mazurczyk
Summary: This article introduces the objectives, techniques, and performance evaluation of the IPv6CC suite, as well as its ability to bypass security tools.
Article
Computer Science, Information Systems
Aleksandra Mileva, Aleksandar Velinov, Laura Hartmann, Steffen Wendzel, Wojciech Mazurczyk
Summary: MQTT, a publish-subscribe protocol popular in IoT applications, is systematically analyzed in this paper to explore potential data hiding techniques, with a focus on network covert channels. The authors develop proof-of-concept implementations and evaluate their performance for practical feasibility.
COMPUTERS & SECURITY
(2021)
Article
Computer Science, Hardware & Architecture
Stien Vanderhallen, Jo Van Bulck, Frank Piessens, Jan Tobias Muhlberg
Summary: Automotive control networks are vulnerable to security threats from long-range connectivity in modern cars, but strengthening security may impact deployability and vehicle safety. This article explores the use of covert channels for vehicular message authentication as a transparent, resource-conserving approach to automotive network security.
Article
Computer Science, Information Systems
Muawia A. Elsadig, Ahmed Gafar
Summary: The advanced development of computer networks and communication technologies has made covert communications easier to construct and harder to detect. This review focuses on the detection techniques of covert channels using machine learning approaches. It also includes a comparative experimental study evaluating the performance of common machine learning methods in this field.
Article
Engineering, Civil
Seyoung Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee
Summary: This study proposes a novel automotive intrusion detection system that leverages residuals to detect vehicle intrusions, including sophisticated attacks that emulate clock skew. It also enables the sharing of parameters between vehicle models, enhancing scalability.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Information Systems
Oren Shvartzman, Adar Ovadya, Kfir Zvi, Omer Shwartz, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren
Summary: This paper presents two network timing covert channel attacks and a defense mechanism against them. The attacks aim to leak sensitive information by manipulating the router's response time. The defense mechanism is based on semi-supervised machine learning and deep learning algorithms for detecting unusual traffic and blocking suspicious devices involved in the attack.
COMPUTERS & SECURITY
(2023)
Article
Computer Science, Information Systems
Haotian Cao, Hao Yin, Feng Gao, Zijian Zhang, Bakh Khoussainov, Shubin Xu, Liehuang Zhu
Summary: The article discusses the relationship between the quality of covert communications, the choice of communication channels, and the design of data embedding schemes. It introduces the prevalence of the Bitcoin system as a covert communication channel and addresses the challenges posed by the openness and persistent storage of the ledger in the Bitcoin system. The article proposes hash chain-based and elliptic curve Diffie-Hellman chain-based covert data embedding schemes and validates their security and efficiency through experimental analysis on the Bitcoin Testnet.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Shi-Yuan Wang, Matthieu R. Bloch
Summary: The study examines covert communication over MIMO AWGN channels, focusing on the balance between reliable communication between sender and receiver while avoiding detection by adversaries. It characterizes the covert capacity based on static and known MIMO channel matrices, and extends this characterization to scenarios where the adversary's channel matrix is known under certain constraints.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Information Systems
Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione
Summary: The utilization of information hiding techniques for empowering modern malware has become a concern for security experts. Understanding data hiding mechanisms is crucial for designing effective countermeasures. Reversible data hiding methods can be used in various network conditions and are not impaired by middleboxes.
Article
Computer Science, Information Systems
Xinying Chen, Jianping An, Zehui Xiong, Chengwen Xing, Nan Zhao, F. Richard Yu, Arumugam Nallanathan
Summary: Information security is a critical issue in wireless networks, and covert communication emerges as a potential solution due to its high-security level. By hiding transmitted signals in noise, covert communication can ensure stronger information security. However, challenges such as effective randomness utilization and low signal-to-interference-plus-noise ratio still exist in its practical implementation.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2023)
Article
Chemistry, Analytical
Krystian Grzesiak, Zbigniew Piotrowski
Summary: This article proposed and examined a superposition-based covert channel and its demodulator, using 8FSK modulation and considering channel estimation error and imperfect SIC operation. The study showed that the NN-based demodulator outperforms the traditional correlator-based 8FSK demodulator in various cases, and can provide error-free demodulation with additional covert channel coding.
Article
Computer Science, Information Systems
Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, Majdi Maabreh, Yahya Tashtoush
Summary: The paper explores the automatic classification and identification of covert timing channels using deep neural networks, specifically LSTM, 1D-CNN, and a hybrid of LSTM and 1D-CNN. These classifiers were trained and tested using real inter-arrival times datasets labeled with covert or legitimate. The evaluation results show that the hybrid model outperforms other models with an accuracy of 97.5%.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Domenico Cotroneo, Luigi De Simone, Roberto Natella
Summary: Virtualization technology is widely used in security-critical embedded systems for higher performance and design flexibility, but it brings new security threats like timing covert channels. This paper presents an experimental assessment approach to evaluate the robustness of system configurations against such information leakage.
COMPUTERS & SECURITY
(2021)