conference logo

Playlist "22C3: Private Investigations"

Covert channels in TCP/IP: attack and defence

Steven J. Murdoch

This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.