{"title":"利用HTTP post方法通过隐蔽通道窃取信息","authors":"Nishi Tomar, M. Gaur","doi":"10.1109/WOCN.2013.6616180","DOIUrl":null,"url":null,"abstract":"Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Information theft through covert channel by exploiting HTTP post method\",\"authors\":\"Nishi Tomar, M. Gaur\",\"doi\":\"10.1109/WOCN.2013.6616180\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.\",\"PeriodicalId\":388309,\"journal\":{\"name\":\"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOCN.2013.6616180\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2013.6616180","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information theft through covert channel by exploiting HTTP post method
Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.