Back to Search Start Over

Communication Model and Capacity Limits of Covert Channels Created by Software Activities

Authors :
Baki Berkay Yilmaz
Milos Prvulovic
Nader Sehatbakhsh
Alenka Zajic
Source :
IEEE Transactions on Information Forensics and Security. 15:1891-1904
Publication Year :
2020
Publisher :
Institute of Electrical and Electronics Engineers (IEEE), 2020.

Abstract

It has been shown that digital and/or analog characteristics of electronic devices during executing programs can create a side-channel which an attacker can exploit to extract sensitive information such as cryptographic keys. When the attacker modifies the software application to exfiltrate sensitive information through a channel, this channel is called a covert channel . In this paper, we model this covert channel as a communication channel and derive upper and lower capacity bounds. Because the covert channels are not designed to transmit information, they are exposed not only to the errors created by the transmission, but also by varying the execution time of computer activities, and/or by insertions from other activities such as interrupts, stalls, etc. Combining all of these effects, we propose to model the covert channel as an insertion channel where the transmitted sequence is a pulse amplitude modulated signal with random pulse positions. Utilizing this model, we derive capacity bounds of the covert channel with random insertion and substitution due to the noise and jitter errors, and propose a receiver design that can correctly detect the computer-activity-created signals. To illustrate the severity of leakages, we perform experiments with high clock speed devices at some distance. Further, the theoretical derivations are compared to empirical results, and show good agreement.

Details

ISSN :
15566021 and 15566013
Volume :
15
Database :
OpenAIRE
Journal :
IEEE Transactions on Information Forensics and Security
Accession number :
edsair.doi...........4a27f73a20b9868d6d4fbddb5a6f4130