DocumentCode :
3388806
Title :
Design, implementation and evaluation of covert channel attacks
Author :
Okhravi, Hamed ; Bak, Stanley ; King, Samuel T.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear :
2010
fDate :
8-10 Nov. 2010
Firstpage :
481
Lastpage :
487
Abstract :
Covert channel attacks pose a threat to the security of critical infrastructure and key resources (CIKR). To design defenses and countermeasures against this threat, we must understand all classes of covert channel attacks along with their properties. Network-based covert channels have been studied in great detail in previous work, although several other classes of covert channels (hardware-based and operating system-based) are largely unexplored. One of our contributions is investigating these classes by designing, implementing, and experimentally evaluating several specific covert channel attacks. We implement and evaluate hardware-based and operating system-based attacks and show significant differences in their properties and mechanisms. We also present channel capacity differences among the various attacks, which span three orders of magnitude. Furthermore, we present the concept of hybrid covert channel attacks which use two or more communication categories to transport data. Hybrid covert channels can be qualitatively harder to detect and counter than traditional covert channels. Finally, we summarize the lessons learned through covert channel attack design and implementation, which have important implications for critical asset protection and risk analysis. The study also facilitates the development of countermeasures to protect CIKR systems against covert channel attacks.
Keywords :
critical infrastructures; operating systems (computers); risk analysis; security of data; CIKR system; channel capacity; covert channel attack; critical asset protection; critical infrastructure security; hardware based attack; key resource security; network based covert channel; operating system based attack; risk analysis; Bit rate; Hardware; Noise; Operating systems; Receivers; Registers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technologies for Homeland Security (HST), 2010 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4244-6047-2
Type :
conf
DOI :
10.1109/THS.2010.5654967
Filename :
5654967
Link To Document :
بازگشت