We present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channel provides a general method to hide communications in an 802.11 LAN. The technique uses a one-time password algorithm to ensure high-entropy randomness of the covert messages. We investigate how the covert side channel affects node throughput in mobile and non-mobile scenarios. We also investigate the covertness of the covert side channel using standardized entropy. The results show that the performance impact is minimal and increases slightly as the covert channel bandwidth increases. We further show that the channel has 100% accuracy with minimal impact on rate switching entropy. Finally, we present two applications for the covert channel: ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Network covert channels enable hidden communication and can be used to break security policies. With...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
We present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channe...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Withi...
Abstract—Network covert channels enable a policy-breaking network communication (e.g., within botnet...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Withi...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Network covert channels enable hidden communication and can be used to break security policies. With...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
We present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channe...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Withi...
Abstract—Network covert channels enable a policy-breaking network communication (e.g., within botnet...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Withi...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Network covert channels enable hidden communication and can be used to break security policies. With...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...