{"title":"浮点表示中变长指数重编码提高隐蔽信道带宽","authors":"J. Keller, Carina Heßeling","doi":"10.1145/3590777.3590797","DOIUrl":null,"url":null,"abstract":"In previous work, covert channels in network payload data were introduced that recode floating-point representations, yet introduce errors by modifying mantissa bits. The present research refines those covert channels for the case of fully reversible covert channels, i.e., where the original data is reconstructable by the covert receiver. By using knowledge about the distribution of the data over the number range, a variable length encoding of the exponent is derived that allows to improve covert channel bandwidth to levels comparable with previous work but without introducing errors to original data. The approach is evaluated numerically for two example distributions with respect to bandwidth and detectability.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations\",\"authors\":\"J. Keller, Carina Heßeling\",\"doi\":\"10.1145/3590777.3590797\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In previous work, covert channels in network payload data were introduced that recode floating-point representations, yet introduce errors by modifying mantissa bits. The present research refines those covert channels for the case of fully reversible covert channels, i.e., where the original data is reconstructable by the covert receiver. By using knowledge about the distribution of the data over the number range, a variable length encoding of the exponent is derived that allows to improve covert channel bandwidth to levels comparable with previous work but without introducing errors to original data. The approach is evaluated numerically for two example distributions with respect to bandwidth and detectability.\",\"PeriodicalId\":231403,\"journal\":{\"name\":\"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3590777.3590797\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3590777.3590797","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations
In previous work, covert channels in network payload data were introduced that recode floating-point representations, yet introduce errors by modifying mantissa bits. The present research refines those covert channels for the case of fully reversible covert channels, i.e., where the original data is reconstructable by the covert receiver. By using knowledge about the distribution of the data over the number range, a variable length encoding of the exponent is derived that allows to improve covert channel bandwidth to levels comparable with previous work but without introducing errors to original data. The approach is evaluated numerically for two example distributions with respect to bandwidth and detectability.