You are on page 1of 2

An Overview of Covert Channels

E. Pennington, W. Oblitey, S. Ezekiel, J. Wolfe


Covert Channels Research Group
Computer Science Department
IUP, Indiana, PA 15705
e.j.pennington, oblitey, sezekiel, jlwolfe@iup.edu

ABSTRACT them hidden from the warden, they communicate with


each other in code. Each word with an even number of
A covert channel is any method of communication that is letters is read as a 1. Each word with an odd number of
used to illicitly transfer information, thus breaking the letters is read as a 0. For example, if Bob sent a message
security policy of the system. Any shared resource can to Alice asking “Hey, what are you up to,” Alice would
potentially be used as a covert channel. There are many interpret is as “010011.” The warden, in this case, has
threats that modern network security must take into been used as a covert channel [1]. Although no prisoners
account. From brute force password attacks to port would probably attempt that in real life, it works very well
scanning, the issues, which system engineers and as an analogy for how a covert channel operates.
administrators must worry about, increase at a faster than According to the Department of Defense’s (DoD) Trusted
normal pace. However, one of the issues that many in the Computer System Evaluation Criteria (TSEC), “A covert
field have not paid enough attention to is covert channels. channel is any communication channel that can be
In this paper, we present an overview of covert channels exploited by a process to transfer information in a manner
with examples. We explore the two types of covert that violates the system’s security policy” [2]. There are
channels: storage channels and timing channels. Storage two different types of covert channels, known as covert
channels are more commonly used than timing channels storage channels and covert timing channels, respectively.
because they are easier to implement. Both constitute Following this introduction, we briefly discuss storage
major security threats. Covert channels can be designed channels, timing channels, and the problem of noise in the
for either a single system or a network. It is important for next section. The connection between steganography and
system engineers to understand covert channels so that covert channels is presented in section three, and section
they will be able to preemptively overcome certain four is our conclusion.
security problems. We also explore the implementation
problems associated with covert channels, for example 2. Types of Covert Channels
noise. The associated topic of information hiding, which
includes steganography, is also presented. In this section, we discuss the basics of covert storage
channels and covert timing channels, with examples of
KEY WORDS each. We also present the problem of noise in covert
channels.
Covert Channel, Storage Channel, Timing Channel,
Steganography, Security, and Network 2.1 Storage Channels

1. Introduction Covert storage channels are methods of communication


that “include all vehicles that would allow the direct or
Until the 1980s, issues of network security rarely entered indirect writing of a storage location by one process and
into the minds of system engineers – that has all changed. the direct or indirect reading of it by another” [2]. In
A system’s security now has top priority. Despite this other words, one process writes to a shared resource,
fact, many system programmers have overlooked the while another process reads from it. Storage channels can
threat of covert channels. Although they have been be used between processes within a single computer or
around since the dawn of modern computing, they are between multiple computers across a network [3]. A good
only now beginning to receive wider attention. To example of a storage channel is a printing queue. The
illustrate the problem more fully, let us use an analogy. process with higher security privileges, the sending
Alice and Bob have been incarcerated and placed in two process, either fills up the printer queue to signal a 1 or
separate jail cells. They want to coordinate an escape leaves it as it is to signal a 0. The process with lower
plan. However, they have a small problem. All messages security privileges, the receiving process, polls the printer
that they send to each other must first be read by the queue to see whether or not it is full and determines the
warden before being passed on. In order to be able to value accordingly.
coordinate their plans while at the same time keeping
2.2. Timing Channels correctly, this should not alter the image enough to be
noticeable to the human eye. However, the more data
Covert timing channels are methods of communication stored in the picture, the more the picture is altered [10].
that “include all vehicles that would allow one process to
signal information to another process by modulating its 4. Conclusion
own use of system resources in such a way that the
change in response time observed by the second process We presented an overview of covert channels, its types,
would provide information” [2]. In other words, it is and examples of each. We also briefly discussed noise in
essentially any method that uses a clock or measurement covert channels as well as their relation to steganography.
of time to signal the value being sent over channel. Our research will continue with further study in
Similarly to storage channels, timing channels can exist developing covert channel detection and defense.
both in a single-computer setting and a network setting.
However, they are less practical in a network setting [4]. Acknowledgements:
An example of a timing channel can be found in a
movable head I/O device, such as a hard disk. One The authors would like to thank the Computer Science
process with higher security privileges, the sending Department at IUP, and acknowledge the help of the
process, has access to the entire device while another Covert Channels Research Group members, Michael
process with lower security privileges, the receiving McFail, Robert Trimble, and Kathleen Reiland.
process, only has access to a small portion of the device.
Requests to the device are processed serially. To signal a References:
1, the sending process makes a read request far away from
[1] G. Simmons. The Prisoner’s Problem, 1983.
the section that the receiving process has access to. To
[2] Department of Defense. Trusted Computer System
signal a 0, it does nothing. The receiving process makes a
Evaluation Criteria, 1985.
read request within its own section and uses the time it
[3] M. McFail. Covert Storage Channels: A Brief
takes for the head to travel to the section and finish the
Overview. PACISE conference. Bloomsburg, PA, 2005.
read request to determine the value accordingly [2].
[4] E. Pennington. Covert Timing Channels: A Brief
Papers by the National Computer Security Center [5] and
Overview. PACISE conference. Bloomsburg, PA, 2005.
Van Vleck [6] provide more examples of timing channels.
[5] National Computer Security Center. A Guide to
2.3. Noise in Covert Channels Understanding Covert Channel Analysis of Trusted
Systems, 1993.
One of the major problems in a successful implementation [6] T. Van Vleck. Multics Timing Channels. IEEE TCSP
of a covert channel is noise. “A noisy channel conference. Oakland, California, 1990.
intentionally or accidentally corrupts the data signal with [7] N. Proctor and P. Neumann. Architectural
errors so that the information rate is slower than the data Implications of Covert Channels. SRI International,
rate” [7]. Because it is a primary problem in their 1992.
implementation, it is also the best defenses against covert [8] M. Owens. A Discussion of Covert Channels and
channels. If enough noise is introduced into a covert Steganography.” SANS Institute, 2002.
channel, it can hinder the use of that channel. The [9] K. Reiland. Steganography and Covert Channels.
receiving process would have to request the same data PACISE conference. Bloomsburg, PA, 2005.
continuously and wait for a very high level of redundancy [10] G. Kessler. Steganography: Hiding Data Within
before knowing that it is reliable. This process may take Data. 2001.
many hours for a request that would only take a few clock
cycles if the channel was noise-free. Although this does
not halt the covert channel, it can considerably decrease
its speed [7].

3. Steganography
Steganography is a method of covert communication that
relates well to covert channels. It is any method used to
conceal a secret object within another public object [8].
When employing any steganographic techniques, a cover-
file is used to hide the information. It can be a text-file,
audio, image, video, piece of software, or others [9]. A
common example of steganography is known as least
significant bit (LSB) insertion. In a 24-bit bitmap image,
the colors red, green, and blue have one byte each that
represent their intensities. A steganographer could replace
the least intense bits with the hidden message. If done

You might also like