With the increasing number of steganography-capable malware and the increasing trend of stealthy data exfiltrations, network covert channels are becoming a crucial security threat – also for critical infrastructures (CIs): network covert channels enable the stealthy remote-control of malware nested in a CI and allow to exfiltrate sensitive data, such as sensor values, firmware or configuration parameters. We present WoDiCoF, a distributed testbed, accessible for the international research community to perform a unified evaluation of detection algorithms for network covert channels. In comparison to existing works, our testbed is designed for upcoming bigdata scenarios, in which huge traffic recordings must be analyzed for covert channels. I...
Part 3: INFRASTRUCTURE SECURITYInternational audienceDespite extensive research, covert channels are...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
With the increasing number of steganography-capable malware and the increasing trend of stealthy dat...
Communication is not necessarily made se- cure by the use of encryption alone. The mere existence of...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Modern malware increasingly exploits information hiding to re- main undetected while attacking. To t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The 'arm race' against malware developers requires to collect a wide variety of performance measurem...
Since the dawn of human communications, there have been people that have wished to correspond secret...
International audienceNetwork covert channels break a computer's security policy to establish a stea...
Computer network is unpredictable due to information warfareand is prone to various attacks. Such at...
Part 3: INFRASTRUCTURE SECURITYInternational audienceDespite extensive research, covert channels are...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
With the increasing number of steganography-capable malware and the increasing trend of stealthy dat...
Communication is not necessarily made se- cure by the use of encryption alone. The mere existence of...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Modern malware increasingly exploits information hiding to re- main undetected while attacking. To t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The 'arm race' against malware developers requires to collect a wide variety of performance measurem...
Since the dawn of human communications, there have been people that have wished to correspond secret...
International audienceNetwork covert channels break a computer's security policy to establish a stea...
Computer network is unpredictable due to information warfareand is prone to various attacks. Such at...
Part 3: INFRASTRUCTURE SECURITYInternational audienceDespite extensive research, covert channels are...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...