Abstract

A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an entity. Examples of this entity include the interpacket delays of a packet stream, the reordering packets in a packet stream, or the resource access time of a cryptographic module. Advances in the information and coding theory and the availability of high-performance computing systems interconnected by high-speed networks have spurred interest in and development of various types of timing channels. With the emergence of complex timing channels, novel detection and prevention techniques are also being developed to counter them. In this article, we provide a detailed survey of timing channels broadly categorized into network timing channel, in which communicating entities are connected by a network, and in-system timing channel, in which the communicating entities are within a computing system. This survey builds on the last comprehensive survey by Zander et al. [2007] and considers all three canonical applications of timing channels, namely, covert communication, timing side channel, and network flow watermarking. We survey the theoretical foundations, the implementation, and the various detection and prevention techniques that have been reported in literature. Based on the analysis of the current literature, we discuss potential future research directions both in the design and application of timing channels and their detection and prevention techniques.

Highlights

  • According to [Department of Defense Standard 1985], a covert channel is defined as a “communication channel that allows a process to transfer information in a manner that violates the system’s security policy.” Here the term system may refer to single computer system or a distributed system connected by network

  • Inclusion of timing side channel (TSC) in the survey helps to complete the understanding of different timing channels that is started by covert timing channel communication (CTCC) and network flow watermarking (NFW)

  • In this paper we have provided a detailed survey of timing channels

Read more

Summary

A Survey of Timing Channels and Countermeasures

In this paper we provide a detailed survey of timing channels broadly categorized into network timing channel in which communicating entities are connected by a network and in-system timing channel in which the communicating entities are within a computing system This survey builds upon the last comprehensive survey by [Zander et al 2007] and considers all the three canonical applications of timing channels namely, covert communication, timing side-channel, and network flow watermarking. Based on the analysis of the current literature we articulate potential future research directions both in the design and applications of timing channels and their detection and prevention techniques. Categories and Subject Descriptors: A.1 [General Literature]: INTRODUCTORY AND SURVEY; C.2.0 [COMPUTER-COMMUNICATION NETWORKS]: General—Security and protection; K.6.5 [Management of Computing and Information Systems]: Security and Protection—Unauthorized access.

INTRODUCTION
Outline
NETWORK TIMING CHANNELS
Covert timing channel communication
Remote timing side channel
Summary
NETWORK FLOW WATERMARKING
Blind flow watermarking
Hybrid flow watermarking
Flow fingerprinting
Cost analysis of different categories
Threat models
IN-SYSTEM TIMING CHANNELS
Architecture based in-system timing channel techniques
Detection and Prevention
CONCLUSIONS
PRELIMINARIES
Key Entities and Definitions
Timing Channel Requirements
THREAT MODELS
AN EXAMPLE OF TIME-REPLAY CTCC
MODEL BASED CTCC FRAMEWORK
COMPRESSIBILITY METRIC
VARIOUS FLOW TRANSFORMATION TECHNIQUES
CENTROID OF AN INTERVAL
DSSS BASED FLOW WATERMARKING SYSTEM

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.