Firewall Wizards mailing list archives

Re: covert timing channel data


From: "Gautier . Rich" <RGautier () drc com>
Date: Fri, 30 Jul 2010 08:06:18 -0400

Here is an example with regards to software algorithms
http://www.owasp.org/index.php/Covert_timing_channel

There is no 'actual interarrival times' or program to generate such an attack - A covert timing channel attack is a 
method (think of methods of cryptanalysis such as frequency analsysis) to analyze the inner operations of a program 
based on design differences in operations that make up how the system works.  The page I included has an example of a 
password checking algorithm that could be 'attacked' using a covert timing channel attack because the methodology of 
the sample program differs based on successful password length.

Rich Gautier
Sr. Product Architect
Kadix Systems
Office: 571-226-8828
Cell: 703-231-2156

From: firewall-wizards-bounces () listserv icsalabs com [mailto:firewall-wizards-bounces () listserv icsalabs com] On 
Behalf Of Melissa Stockman
Sent: Saturday, July 24, 2010 12:05 PM
To: firewall-wizards () listserv icsalabs com
Subject: [fw-wiz] covert timing channel data

Hi,

I'm doing research on covert timing channel detection and was not able to get data from any of the authors of various 
papers describing different covert timing channel techniques.  Does anyone know where I can find such data? (either the 
program to generate it, or the actual interarrival times in a comma separated file)

Thanks and regards,

Melissa Stockman

_______________________________________________
firewall-wizards mailing list
firewall-wizards () listserv icsalabs com
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards

Current thread: