Difference between revisions of "Kiyavash2013"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 6: Line 6:
|abstract=<p>This paper presents the design and implementation of spyware communication circuits built into the widely used carrier sense multiple access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit impossible. We take advantage of the timing channel resulting from transmission of packets to implement a new practical coding scheme that covertly transfers the spied data. Our codes are robust against the CSMA/CA\&rsquo;s random retransmission time for collision avoidance and in fact take advantage of it to disguise the covert communication. The data snooping may be sporadically triggered, either externally or internally. The occasional trigger and the real-time traffic\&rsquo;s variability make the spyware timing covert channel detection a challenge. The spyware is implemented and tested on a widely used open-source wireless CSMA/CA radio platform. We identify the following performance metrics and evaluate them on our architecture: 1) efficiency of implementation of the encoder; 2) robustness of the communication scheme to heterogeneous CSMA/CA effects; and 3) difficulty of covert channel detection. We evaluate criterion 1) completely theoretically. Criterion 2) is evaluated by simulating a wireless CSMA/CA architecture and testing the robustness of the decoder in different heterogeneous wireless conditions. Criterion 3) is confirmed experimentally using the state-of-the-art covert timing channel detection methods.</p>
|abstract=<p>This paper presents the design and implementation of spyware communication circuits built into the widely used carrier sense multiple access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit impossible. We take advantage of the timing channel resulting from transmission of packets to implement a new practical coding scheme that covertly transfers the spied data. Our codes are robust against the CSMA/CA\&rsquo;s random retransmission time for collision avoidance and in fact take advantage of it to disguise the covert communication. The data snooping may be sporadically triggered, either externally or internally. The occasional trigger and the real-time traffic\&rsquo;s variability make the spyware timing covert channel detection a challenge. The spyware is implemented and tested on a widely used open-source wireless CSMA/CA radio platform. We identify the following performance metrics and evaluate them on our architecture: 1) efficiency of implementation of the encoder; 2) robustness of the communication scheme to heterogeneous CSMA/CA effects; and 3) difficulty of covert channel detection. We evaluate criterion 1) completely theoretically. Criterion 2) is evaluated by simulating a wireless CSMA/CA architecture and testing the robustness of the decoder in different heterogeneous wireless conditions. Criterion 3) is confirmed experimentally using the state-of-the-art covert timing channel detection methods.</p>
|pages=477 - 487
|pages=477 - 487
|month=3
|year=2013
|volume=8
|volume=8
|journal=IEEE Transactions on Information Forensics and Security
|journal=IEEE Transactions on Information Forensics and Security
|title=A Timing Channel Spyware for the CSMA/CA Protocol
|title=A Timing Channel Spyware for the CSMA/CA Protocol
|entry=article
|entry=article
|date=2013-3/-01
|pdf=Kiyavash2013.pdf
}}
}}

Latest revision as of 17:35, 9 November 2021

Kiyavash2013
entryarticle
address
annote
authorKiyavash, Negar and Farinaz Koushanfar and Coleman, Todd P. and Rodrigues, Mavis
booktitle
chapter
edition
editor
howpublished
institution
journalIEEE Transactions on Information Forensics and Security
month3
note
number
organization
pages477 - 487
publisher
school
series
titleA Timing Channel Spyware for the CSMA/CA Protocol
type
volume8
year2013
doi10.1109/TIFS.2013.2238930
issn
isbn
urlhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6410028
pdfKiyavash2013.pdf

File:Kiyavash2013.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093