Publication Type |
poster |
School or College |
Scientific Computing and Imaging Institute |
Department |
Computing, School of |
Creator |
Kasera, Sneha K. |
Other Author |
Clark, Michael |
Title |
Enhancing covert communications with multiple colluding receivers |
Date |
2010-10-06 |
Description |
Traditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create undetectable system? Previous detection work: ? Signatures - published exploits thwart easily ? Anomaly - qualitative arguments until statistical methods in [1] ? Brute-Force - never mentioned in literature, significant oversight Thwarting Brute-Force Detection: ? Propose multiple colluding receiver design ? Verify possibility of brute-force in single receiver system ? Show our design's resilience to threat Thwarting Anomaly Detection: ? Propose better quantification technique ? Provide fast approximation |
Type |
Text; Image |
Publisher |
University of Utah |
Language |
eng |
Bibliographic Citation |
Kasera, S. K., & Clark, M. (2010). Enhancing Covert Communications with Multiple Colluding Receivers. University of Utah. |
Rights Management |
(c)Michael Clark, Sneha Kumar Kasera |
Format Medium |
application/pdf |
Format Extent |
600,859 bytes |
Identifier |
ir-main/14817 |
Permissions Reference URL |
https://collections.lib.utah.edu/details?id=1251671 |
ARK |
ark:/87278/s6w674fs |
Setname |
ir_uspace |
ID |
707630 |
Reference URL |
https://collections.lib.utah.edu/ark:/87278/s6w674fs |