首页> 外文期刊>IEEE transactions on information forensics and security >Communication Model and Capacity Limits of Covert Channels Created by Software Activities
【24h】

Communication Model and Capacity Limits of Covert Channels Created by Software Activities

机译:软件活动创建的隐蔽通道的通信模型和容量限制

获取原文
获取原文并翻译 | 示例

摘要

It has been shown that digital and/or analog characteristics of electronic devices during executing programs can create a side-channel which an attacker can exploit to extract sensitive information such as cryptographic keys. When the attacker modifies the software application to exfiltrate sensitive information through a channel, this channel is called a covert channel. In this paper, we model this covert channel as a communication channel and derive upper and lower capacity bounds. Because the covert channels are not designed to transmit information, they are exposed not only to the errors created by the transmission, but also by varying the execution time of computer activities, and/or by insertions from other activities such as interrupts, stalls, etc. Combining all of these effects, we propose to model the covert channel as an insertion channel where the transmitted sequence is a pulse amplitude modulated signal with random pulse positions. Utilizing this model, we derive capacity bounds of the covert channel with random insertion and substitution due to the noise and jitter errors, and propose a receiver design that can correctly detect the computer-activity-created signals. To illustrate the severity of leakages, we perform experiments with high clock speed devices at some distance. Further, the theoretical derivations are compared to empirical results, and show good agreement.
机译:已经显示出,在执行程序期间电子设备的数字和/或模拟特性可以创建辅助信道,攻击者可以利用该辅助信道来提取诸如加密密钥之类的敏感信息。当攻击者修改软件应用程序以通过通道泄露敏感信息时,该通道称为秘密通道。在本文中,我们将此隐式通道建模为通信通道,并得出容量上限和下限。因为隐蔽通道不是设计用来传输信息的,所以它们不仅会暴露于传输造成的错误,还会暴露于计算机活动的执行时间和/或来自其他活动(如中断,停顿等)的插入时间。结合所有这些影响,我们建议将隐蔽通道建模为插入通道,其中传输序列是具有随机脉冲位置的脉冲幅度调制信号。利用此模型,我们可以得出由于噪声和抖动误差而导致的随机插入和替换的隐蔽通道的容量范围,并提出了一种可以正确检测计算机活动创建信号的接收器设计。为了说明泄漏的严重性,我们在一定距离下使用高时钟速度的设备进行了实验。此外,将理论推导与经验结果进行比较,并显示出良好的一致性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号