Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert channels and device fingerprinting

Steven J. Murdoch

This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.

Related

Download

Embed

Share:

Tags