DocumentCode :
2828951
Title :
20 years of covert channel modeling and analysis
Author :
Millen, Jonathan
Author_Institution :
Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA
fYear :
1999
fDate :
1999
Firstpage :
113
Lastpage :
114
Abstract :
Covert channels emerged in mystery and departed in confusion. Covert channels are a means of communication between two processes that are not permitted to communicate, but do so anyway, a few bits at a time, by affecting shared resources. Information hiding is slightly different: the two communicating parties are allowed to talk, but the content is censored and restricted to certain subjects. The trick is to “piggyback” some contraband data invisibly on the legitimate content. The canonical example of this is to use the low-order two bits of each pixel in a picture for your secret message, since no one would notice if they were changed. When a similar idea was applied to smuggle information in network headers, we called it a network covert channel, mostly because the term “information hiding” hadn´t been invented yet. The article traces the history of covert channel modeling from 1980 to the present (1999)
Keywords :
cryptography; history; message passing; telecommunication channels; canonical example; communicating parties; contraband data; covert channel modeling; history; information hiding; low-order two bits; network covert channel; network headers; secret message; shared resources; Computer science; Cryptography; Guidelines; Kernel; Laboratories; Mathematical model; Multilevel systems; Signal design; Signal processing; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on
Conference_Location :
Oakland, CA
ISSN :
1081-6011
Print_ISBN :
0-7695-0176-1
Type :
conf
DOI :
10.1109/SECPRI.1999.766906
Filename :
766906
Link To Document :
بازگشت