This paper presents the design and implementation of spyware communication circuits built into the widely used Carrier Sense Multiple Access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit impossible. We take advantage of the timing channel resulting from transmission of packets to implement a new practical coding scheme that covertly transfers the spied data. Our codes are robust against the CSMA/CA’s random retransmission time for collision avoidance and in fact take advantage of it to disguise the covert communication. The data snoopin...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are becoming more popular as security risks grow in networks. One area that is prom...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Abstract-Carrier-sensing multiple-access with collision avoidance (CSMA/CA)-based networks, such as ...
Indirect communication channels have been effectively employed in the communications world to bypass...
Abstract—The CSMA/CA protocol is the most commonly used medium access mechanism in wireless networks...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
MAC address randomization is a common privacy protection measure deployed in major operating systems...
Covert timing channels are an important alternative for transmitting information in the world of the...
In this report, we analyze the effects of hidden terminals on CSMA/CA multiple ac-cess scheme in wir...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are becoming more popular as security risks grow in networks. One area that is prom...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Abstract-Carrier-sensing multiple-access with collision avoidance (CSMA/CA)-based networks, such as ...
Indirect communication channels have been effectively employed in the communications world to bypass...
Abstract—The CSMA/CA protocol is the most commonly used medium access mechanism in wireless networks...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
MAC address randomization is a common privacy protection measure deployed in major operating systems...
Covert timing channels are an important alternative for transmitting information in the world of the...
In this report, we analyze the effects of hidden terminals on CSMA/CA multiple ac-cess scheme in wir...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are becoming more popular as security risks grow in networks. One area that is prom...