The ability of creating covert channels within network traffic is now largely exploited by malware to elude detection, remain unnoticed while exfiltrating data or coordinating an attack. As a consequence, designing a network covert channel or anticipating its exploitation are prime goals to fully understand the security of modern network and computing environments. Due to its ubiquitous availability and large diffusion, Transport Layer Security (TLS) traffic may quickly become the target of malware or attackers wanting to establish a hidden communication path through the Internet. Therefore, this paper investigates mechanisms that can be used to create covert channels within TLS conversations. Experimental results also demonstrated the inability of de-facto standard network security tools to spot TLS-based covert channels out of the box.

Covert Channels in Transport Layer Security: Performance and Security Assessment

Marco Zuppelli;Luca Caviglione
2021

Abstract

The ability of creating covert channels within network traffic is now largely exploited by malware to elude detection, remain unnoticed while exfiltrating data or coordinating an attack. As a consequence, designing a network covert channel or anticipating its exploitation are prime goals to fully understand the security of modern network and computing environments. Due to its ubiquitous availability and large diffusion, Transport Layer Security (TLS) traffic may quickly become the target of malware or attackers wanting to establish a hidden communication path through the Internet. Therefore, this paper investigates mechanisms that can be used to create covert channels within TLS conversations. Experimental results also demonstrated the inability of de-facto standard network security tools to spot TLS-based covert channels out of the box.
2021
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI - Sede Secondaria Genova
covert channels
information hiding
cyber security
security
TLS
File in questo prodotto:
File Dimensione Formato  
prod_462574-doc_180820.pdf

accesso aperto

Descrizione: Covert Channels in Transport Layer Security: Performance and Security Assessment
Tipologia: Documento in Post-print
Licenza: Altro tipo di licenza
Dimensione 4.03 MB
Formato Adobe PDF
4.03 MB Adobe PDF Visualizza/Apri
3424954.3424962.pdf

solo utenti autorizzati

Descrizione: Covert Channels in Transport Layer Security: Performance and Security Assessment
Tipologia: Versione Editoriale (PDF)
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 720.12 kB
Formato Adobe PDF
720.12 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/447860
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? ND
social impact