Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert channels and device fingerprinting

Steven J. Murdoch

Playlists: '22c3' videos starting here / audio / related events

This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.

Download

Related

Embed

Share:

Tags