covert channel
Recently Published Documents


TOTAL DOCUMENTS

363
(FIVE YEARS 102)

H-INDEX

18
(FIVE YEARS 2)

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Shanyun Huang ◽  
Wenyin Zhang ◽  
Xiaomei Yu ◽  
Jiuru Wang ◽  
Wanshui Song ◽  
...  

Due to the unique characteristics of blockchain, such as decentralization, anonymity, high credibility, and nontampering, blockchain technologies have become an integral part of public data platforms and public infrastructure. The communication between the stakeholders of a given blockchain can be used as a carrier for covert communication under cover of legal transactions, which has become a promising research direction of blockchain technology. Due to the special mechanism of blockchain, some traditional blockchain covert communication schemes are not mature enough. They suffer from various drawbacks, such as weak concealment of secret information, cumbersome identification and screening of special transactions, poor availability, and low comprehensive performance. Therefore, this paper designs a scheme of covert communication in the Bitcoin blockchain, which takes normal transactions as a mask and leverages the Bitcoin transaction mechanism to embed secret information in the public key hash field. Specifically, we propose a novel key update mechanism combined with the hash algorithm to construct a covert channel. It ensures security and can update the channel to prevent the related problems caused by address reuse. We are taking advantage of the feature of Bitcoin that cannot be double-spent to solve the problem of burning bitcoin when paying bitcoin to a fake public key hash. In our scheme, both parties to the communication are anonymous, and the attacker cannot detect the covert data or track the transaction and address. Our proposed scheme was tested in real Bitcoin blockchain network, and the experimental results were analyzed to verify its security, availability, and efficiency.


2021 ◽  
Vol 64 (12) ◽  
pp. 105-112
Author(s):  
Jiyong Yu ◽  
Mengjia Yan ◽  
Artem Khyzha ◽  
Adam Morrison ◽  
Josep Torrellas ◽  
...  

Speculative execution attacks present an enormous security threat, capable of reading arbitrary program data under malicious speculation, and later exfiltrating that data over microarchitectural covert channels. This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism to block these attacks. The main idea is that it is safe to execute and selectively forward the results of speculative instructions that read secrets, as long as we can prove that the forwarded results do not reach potential covert channels. The technical core of the paper is a new abstraction to help identify all micro-architectural covert channels, and an architecture to quickly identify when a covert channel is no longer a threat. We further conduct a detailed formal analysis on the scheme in a companion document. When evaluated on SPEC06 workloads, STT incurs 8.5% or 14.5% performance overhead relative to an insecure machine.


2021 ◽  
pp. 119-131
Author(s):  
Володимир Вікторович Бараннік ◽  
Наталія Вячеславівна Бараннік ◽  
Олександр Олексійович Ігнатьєв ◽  
Вікторія Вікторівна Хіменко

It is substantiated that steganographic systems should be used to ensure the protection of special information resources in conditions of its prompt delivery. Here, steganographic technologies are an integral part of complex information protection systems. Simultaneously, for steganographic systems, there is a contradiction between the density of embedded data and level of information compaction of video container (level of reduction of volume bit volume of compact presented video image concerning bit volume of an initial video image). It leads to the fact that under the conditions of the required quality (reliability) of digital video information, the bit rate level of the covert channel is insufficient. Consequently, the scientific-applied problem concerns the necessity to increase the integrity (the level of correspondence of the hidden information before its embedding in a video container and after its extraction) and bit rate of the hidden channel of special information transmission. It is relevant. The solution of the described problem in the field of application of steganographic transformations can be realized based on the application of two different approaches. The first approach is based on methods of direct message embedding. But this approach is characterized by introducing distortions in the video images used as a container. Therefore, changes in structural and statistical patterns in the syntactic description of the video container happen. It reduces the potential for video container compaction. The second approach to creating steganographic transformation methods is based on information hiding using indirect embedding technique. Here, the embedding process exploits the functional dependency between the elements of the video container and the elements of the embedded message. Setting a specific dependency between the elements in the video container corresponds to the embedded element with a value of "0" or "1". However, the existing indirect steganographic transformation methods have a disadvantage. It consists of an insufficient value of embedded data density. To eliminate these disadvantages, it is proposed to develop an approach that allows using not only psychovisual but also structural redundancy of video container for concealment. Therefore, the research objective of this paper is to develop a method for indirect information withholding in the video container compression process to increase the bit rate of the hidden message channel. In the process of research, a steganographic multiagent system is constructed, which allows embedding hidden message elements without loss of information based on the indirect approach by modifying the active bases of the multiagent basis considering their uncertainty. To select transformants (data sets) as containers for information embedding, the requirement of the existence of a base system with all active bases is taken into account. The number of embedded bits of the hidden message is equal to the number of active bases in the base system of the multiadic space. Because of the made experiments, the following results have been received: in the process of embedding messages based on the created method distortions in a video container is not brought; for the created method the additional increase in the hidden channel bit rate in average 5 … 7 times are reached.


2021 ◽  
Author(s):  
Jaeguk Ahn ◽  
Jiho Kim ◽  
Hans Kasan ◽  
Zhixian Jin ◽  
Leila Delshadtehrani ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6395
Author(s):  
Krzysztof Sawicki ◽  
Grzegorz Bieszczad ◽  
Tomasz Sosnowski

The article presents a new concept—steganography in thermography. Steganography is a technique of hiding information in a non-obvious way and belongs to sciences related to information security. The proposed method, called ThermoSteg, uses a modification of one of the parameters of the thermal imaging camera—integration time—to embed the signal containing hidden information. Integration time changing makes the microbolometer array heat up while reading the sensors. The covert information can be extracted from the stream of thermograms recorded by another thermal camera that observes the first one. The covert channel created with the ThermoSteg method allows the transmission of covert data using a thermal sensor as a wireless data transmitter. This article describes a physical phenomenon that is exploited by the ThermoSteg method and two proposed methods of covert data extraction, and presents the results of experiments.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6268
Author(s):  
Krzysztof Sawicki ◽  
Grzegorz Bieszczad ◽  
Zbigniew Piotrowski

The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed coordination function), especially in IEEE 802.11 networks. Such a covert channel enables the possibility of leaking crucial information outside secured network in a manner that is difficult to detect. The SFO method embeds hidden bits of information in the relative order of frames transmitted by wireless terminals operating on the same radio channel. The paper presents an idea of this covert channel, its implementation, and possible variants. The paper also discusses implementing the SFO method in a real environment and the experiments performed in the real-world scenario.


Sign in / Sign up

Export Citation Format

Share Document