conference logo

Playlist "Covert channels in TCP/IP: attack and defence"

Covert channels in TCP/IP: attack and defence

Steven J. Murdoch

This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.