On Characterizing and Measuring Out-of-Band Covert Channels

作者: Brent C. Carrara , Carlisle Adams

DOI: 10.1145/2756601.2756604

关键词:

摘要: A methodology for characterizing and measuring out-of-band covert channels (OOB-CCs) is proposed used to evaluate covert-acoustic (i.e., established using speakers microphones). OOB-CCs are low-probability of detection/low-probability interception commodity devices that not traditionally communication (e.g., speaker microphone, display FM radio, etc.). To date, have been declared "covert" if the signals establish these could be perceived by a human adversary. This work examines from perspective passive adversary argues different required in order effectively assess OOB-CCs. Traditional systems measured their capacity bit error rate; while important parameters, they do capture key measures OOB-CCs: namely, probability an detecting channel amount data two covertly communicating parties can exchange without being detected. As result, adoption measure steganographic (in bits) transferred through OOB-CC before adversary's reaches given threshold. The theoretical discrete memoryless as well additive white Gaussian noise calculated this paper case study performed OOB channels, when uses energy detector detect communication. reveals conditions under which achieve perfect steganography communicated risk detection).

参考文章(48)
Samuel Joseph O’Malley, Kim-Kwang Raymond Choo, Bridging the Air Gap: Inaudible Data Exfiltration by Insiders Social Science Research Network. ,(2014)
Michael LeMay, Jack Tan, Acoustic Surveillance of Physically Unmodified PCs. Security and Management. pp. 328- 334 ,(2006)
Brent Carrara, Carlisle Adams, On Acoustic Covert Channels Between Air-Gapped Systems Foundations and Practice of Security. pp. 3- 16 ,(2015) , 10.1007/978-3-319-17040-4_1
Malcolm J. Crocker, Handbook of Acoustics ,(1998)
Christian Cachin, None, An Information-Theoretic Model for Steganography information hiding. pp. 306- 318 ,(1998) , 10.1007/3-540-49380-8_21
Tomáš Filler, Jessica Fridrich, Fisher Information Determines Capacity of ε-Secure Steganography information hiding. pp. 31- 47 ,(2009) , 10.1007/978-3-642-04431-1_3
Andrew D. Ker, The square root law in stegosystems with imperfect information information hiding. ,vol. 6387, pp. 145- 160 ,(2010) , 10.1007/978-3-642-16435-4_12
Luke Deshotels, Inaudible sound as a covert channel in mobile devices WOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies. pp. 16- 16 ,(2014)
V. Gerasimov, W. Bender, Things that talk: using sound for device-to-device and device-to-human communication Ibm Systems Journal. ,vol. 39, pp. 530- 546 ,(2000) , 10.1147/SJ.393.0530