Firewall Wizards mailing list archives
Re: covert timing channel data
From: "Gautier . Rich" <RGautier () drc com>
Date: Fri, 30 Jul 2010 08:06:18 -0400
Here is an example with regards to software algorithms http://www.owasp.org/index.php/Covert_timing_channel There is no 'actual interarrival times' or program to generate such an attack - A covert timing channel attack is a method (think of methods of cryptanalysis such as frequency analsysis) to analyze the inner operations of a program based on design differences in operations that make up how the system works. The page I included has an example of a password checking algorithm that could be 'attacked' using a covert timing channel attack because the methodology of the sample program differs based on successful password length. Rich Gautier Sr. Product Architect Kadix Systems Office: 571-226-8828 Cell: 703-231-2156 From: firewall-wizards-bounces () listserv icsalabs com [mailto:firewall-wizards-bounces () listserv icsalabs com] On Behalf Of Melissa Stockman Sent: Saturday, July 24, 2010 12:05 PM To: firewall-wizards () listserv icsalabs com Subject: [fw-wiz] covert timing channel data Hi, I'm doing research on covert timing channel detection and was not able to get data from any of the authors of various papers describing different covert timing channel techniques. Does anyone know where I can find such data? (either the program to generate it, or the actual interarrival times in a comma separated file) Thanks and regards, Melissa Stockman
_______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- covert timing channel data Melissa Stockman (Jul 29)
- Re: covert timing channel data Gautier . Rich (Jul 30)