Covert messaging through TCP timestamps

John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Covert channels exist in most communications systems and allow individuals to communicate truly undectably. However, covert channels are seldom used due to their complexity. A protocol for sending data over a common class of low-bandwidth covert channels has been developed. The protocol is secure against attack by powerful adversaries. The design of a practical system implementing the protocol on a standard platform (Linux) exploiting a channel in a common communications system (TCP timestamps) is presented. A partial implementation of this system has been accomplished.

    Original languageEnglish (US)
    Title of host publicationPrivacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers
    EditorsRoger Dingledine, Paul Syverson
    PublisherSpringer Verlag
    Pages194-208
    Number of pages15
    ISBN (Print)354000565X, 9783540005650
    DOIs
    StatePublished - 2003
    Event2nd International Workshop on Privacy Enhancing Technologies, PET 2002 - San Francisco, United States
    Duration: Apr 14 2002Apr 15 2002

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume2482
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference2nd International Workshop on Privacy Enhancing Technologies, PET 2002
    Country/TerritoryUnited States
    CitySan Francisco
    Period4/14/024/15/02

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Fingerprint

    Dive into the research topics of 'Covert messaging through TCP timestamps'. Together they form a unique fingerprint.

    Cite this