Covert messaging through TCP timestamps

John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Covert channels exist in most communications systems and allow individuals to communicate truly undectably. However, covert channels are seldom used due to their complexity. A protocol for sending data over a common class of low-bandwidth covert channels has been developed. The protocol is secure against attack by powerful adversaries. The design of a practical system implementing the protocol on a standard platform (Linux) exploiting a channel in a common communications system (TCP timestamps) is presented. A partial implementation of this system has been accomplished.

    Original languageEnglish (US)
    Title of host publicationPrivacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers
    EditorsRoger Dingledine, Paul Syverson
    PublisherSpringer-Verlag
    Pages194-208
    Number of pages15
    ISBN (Print)354000565X, 9783540005650
    StatePublished - Jan 1 2003
    Event2nd International Workshop on Privacy Enhancing Technologies, PET 2002 - San Francisco, United States
    Duration: Apr 14 2002Apr 15 2002

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume2482
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference2nd International Workshop on Privacy Enhancing Technologies, PET 2002
    CountryUnited States
    CitySan Francisco
    Period4/14/024/15/02

    Fingerprint

    Covert Channel
    Timestamp
    Communication systems
    Communication Systems
    Linux
    Bandwidth
    Attack
    Partial

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Cite this

    Giffin, J., Greenstadt, R., Litwack, P., & Tibbetts, R. (2003). Covert messaging through TCP timestamps. In R. Dingledine, & P. Syverson (Eds.), Privacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers (pp. 194-208). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2482). Springer-Verlag.

    Covert messaging through TCP timestamps. / Giffin, John; Greenstadt, Rachel; Litwack, Peter; Tibbetts, Richard.

    Privacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers. ed. / Roger Dingledine; Paul Syverson. Springer-Verlag, 2003. p. 194-208 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2482).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Giffin, J, Greenstadt, R, Litwack, P & Tibbetts, R 2003, Covert messaging through TCP timestamps. in R Dingledine & P Syverson (eds), Privacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2482, Springer-Verlag, pp. 194-208, 2nd International Workshop on Privacy Enhancing Technologies, PET 2002, San Francisco, United States, 4/14/02.
    Giffin J, Greenstadt R, Litwack P, Tibbetts R. Covert messaging through TCP timestamps. In Dingledine R, Syverson P, editors, Privacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers. Springer-Verlag. 2003. p. 194-208. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    Giffin, John ; Greenstadt, Rachel ; Litwack, Peter ; Tibbetts, Richard. / Covert messaging through TCP timestamps. Privacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers. editor / Roger Dingledine ; Paul Syverson. Springer-Verlag, 2003. pp. 194-208 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{f7f015b37c684c0081993cc86b4eb475,
    title = "Covert messaging through TCP timestamps",
    abstract = "Covert channels exist in most communications systems and allow individuals to communicate truly undectably. However, covert channels are seldom used due to their complexity. A protocol for sending data over a common class of low-bandwidth covert channels has been developed. The protocol is secure against attack by powerful adversaries. The design of a practical system implementing the protocol on a standard platform (Linux) exploiting a channel in a common communications system (TCP timestamps) is presented. A partial implementation of this system has been accomplished.",
    author = "John Giffin and Rachel Greenstadt and Peter Litwack and Richard Tibbetts",
    year = "2003",
    month = "1",
    day = "1",
    language = "English (US)",
    isbn = "354000565X",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    publisher = "Springer-Verlag",
    pages = "194--208",
    editor = "Roger Dingledine and Paul Syverson",
    booktitle = "Privacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers",

    }

    TY - GEN

    T1 - Covert messaging through TCP timestamps

    AU - Giffin, John

    AU - Greenstadt, Rachel

    AU - Litwack, Peter

    AU - Tibbetts, Richard

    PY - 2003/1/1

    Y1 - 2003/1/1

    N2 - Covert channels exist in most communications systems and allow individuals to communicate truly undectably. However, covert channels are seldom used due to their complexity. A protocol for sending data over a common class of low-bandwidth covert channels has been developed. The protocol is secure against attack by powerful adversaries. The design of a practical system implementing the protocol on a standard platform (Linux) exploiting a channel in a common communications system (TCP timestamps) is presented. A partial implementation of this system has been accomplished.

    AB - Covert channels exist in most communications systems and allow individuals to communicate truly undectably. However, covert channels are seldom used due to their complexity. A protocol for sending data over a common class of low-bandwidth covert channels has been developed. The protocol is secure against attack by powerful adversaries. The design of a practical system implementing the protocol on a standard platform (Linux) exploiting a channel in a common communications system (TCP timestamps) is presented. A partial implementation of this system has been accomplished.

    UR - http://www.scopus.com/inward/record.url?scp=84957806554&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84957806554&partnerID=8YFLogxK

    M3 - Conference contribution

    AN - SCOPUS:84957806554

    SN - 354000565X

    SN - 9783540005650

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 194

    EP - 208

    BT - Privacy Enhancing Technologies - 2nd International Workshop, PET 2002, Revised Papers

    A2 - Dingledine, Roger

    A2 - Syverson, Paul

    PB - Springer-Verlag

    ER -