Enhancing covert communications with multiple colluding receivers

Update Item Information
Publication Type poster
School or College Scientific Computing and Imaging Institute
Department Computing, School of
Creator Kasera, Sneha K.
Other Author Clark, Michael
Title Enhancing covert communications with multiple colluding receivers
Date 2010-10-06
Description Traditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create undetectable system? Previous detection work: ? Signatures - published exploits thwart easily ? Anomaly - qualitative arguments until statistical methods in [1] ? Brute-Force - never mentioned in literature, significant oversight Thwarting Brute-Force Detection: ? Propose multiple colluding receiver design ? Verify possibility of brute-force in single receiver system ? Show our design's resilience to threat Thwarting Anomaly Detection: ? Propose better quantification technique ? Provide fast approximation
Type Text; Image
Publisher University of Utah
Language eng
Bibliographic Citation Kasera, S. K., & Clark, M. (2010). Enhancing Covert Communications with Multiple Colluding Receivers. University of Utah.
Rights Management (c)Michael Clark, Sneha Kumar Kasera
Format Medium application/pdf
Format Extent 600,859 bytes
Identifier ir-main/14817
Permissions Reference URL https://collections.lib.utah.edu/details?id=1251671
ARK ark:/87278/s6w674fs
Setname ir_uspace
ID 707630
Reference URL https://collections.lib.utah.edu/ark:/87278/s6w674fs
Back to Search Results