Construction of the Covert Channels

  • Alexander Grusho
  • Elena Timonina
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)


The purpose of this work is the demonstration of an adversary intrusion into protected computing system, when the covert channels are poorly taken into account. We consider an opportunity of overcoming the protection mechanisms placed between a protected segment of a local area network and a global network (for example, Internet). We discuss the ability for a warden to reveal the covert channels. The work is supported with the grant RFBR # 01-01-00895.


Local Area Network Global Network Grant RFBR Virtual Private Network Source Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kolchin, V.F., Sevastianov, B.A., Chistyakov, V.P.: Random accommodations. Science, Moscow (1976)Google Scholar
  2. 2.
    Timonina, E.E.: The covert channels (review). Jet Info, pp. 3-11 (November 2002)Google Scholar
  3. 3.
    Ahsan, K., Kundur, D.: Practical Data Hiding in TCP/IP. In: Workshop Multimedia and Security at ACM Multimedia 2002, December 6. Juan-les-Pins on the French Riviera (2002)Google Scholar
  4. 4.
    A Guide to Understanding Covert Channel Analysis of Trusted Systems. In: National Computer Security Center, NCSC-TG-030, ver. 1 (1993)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Alexander Grusho
    • 1
  • Elena Timonina
    • 1
  1. 1.Russian State University for HumanityMoscowRussia

Personalised recommendations