{"title":"Information theft through covert channel by exploiting HTTP post method","authors":"Nishi Tomar, M. Gaur","doi":"10.1109/WOCN.2013.6616180","DOIUrl":null,"url":null,"abstract":"Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2013.6616180","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.