Abstract We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert channel that leverages hardware interrupts for communication. The evaluation is based on an exploit of IRCCs that we implemented as a proof-of-concept. We use a combination of exper-imental evaluation and information-theoretic analysis to compute the bandwidth of the channel on a concrete system. Our analysis shows a channel bandwidth of IRCCs based on interrupts of network interface cards (NICs) of approximately 5 bit/s. Besides the channel bandwidth, our experiments revealed previously unnoticed properties of IRCCs based on interrupts of NICs. While side channels based on hardware interrupts have been discussed before, this is the first ex...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Features of packet switching networks and the blanket distribution of high-speed IP networks result ...
We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert channel...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Interrupt-driven communication with hardware devices can be exploited for establishing covert ch...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
iv vAbstract Interrupt-related covert channels allow two processes running on a single system to com...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Features of packet switching networks and the blanket distribution of high-speed IP networks result ...
We empirically evaluate interrupt-related covert channels, in short IRCCs, a type of covert channel...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Interrupt-driven communication with hardware devices can be exploited for establishing covert ch...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
iv vAbstract Interrupt-related covert channels allow two processes running on a single system to com...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Features of packet switching networks and the blanket distribution of high-speed IP networks result ...