Covert channel-internal control protocols: attacks and defense
Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc and Michael Meier
Version of Record online: 5 APR 2016 | DOI: 10.1002/sec.1471
Micro protocols have been introduced in the recent years to enhance the capabilities of network covert channels. Usually placed within the hidden bits of a covert channel's payload, they enable features such as reliable data transfer, session management, and dynamic routing for network covert channels. This paper demonstrates some possible attacks on these protocols. The attacks are based on the attacker's interaction with the micro protocol. Defense techniques, which can safeguard these protocols against such attacks, are also presented.