covert channel


Also found in: Wikipedia.

covert channel

A transfer of information that violates a computer's built-in security systems. A covert storage channel refers to depositing information in a memory or storage location that can be accessed by different security clearances. A covert timing channel is the manipulation of a system resource in such a way that it can be detected by another process.
References in periodicals archive ?
Consequently, we can conceal the very existence of the data transmission, and this kind of transmission art is called network covert channel which is a stealthy communication technique utilizing redundancies of network protocols or packet-sequence characteristics to transfer secret message.
Israel's intelligence effort, they say, began in 2012, when the Obama administration first opened a covert channel with Tehran.
The Times said the technology had been in use since at least 2008 and relied on a covert channel of radio waves transmitted from tiny circuit boards and USB cards secretly inserted in the computers.
Among the topics are RFID standards, hardware attacks, an overview of cryptography, privacy versus performance in denial-of-service attacks on RFID systems, and covert channel attacks in RFID-enabled supply chains.
Silently sending SMS messages can create a covert channel for siphoning sensitive information from a device.
British intelligence twice rebuffed attempts by the secret wartime opposition in Nazi Germany to open up a covert channel of communications.
Other features include simultaneous recording and playback, timer recording, alarm and pre-alarm recording, a covert channel function for sensitive applications, and built-in motion detection.
is invariably shared in violation of the MAC policy, forming a covert channel [10, 11].
There are some very clever, technically complex ways of establishing a covert channel.
Leveraging deep packet-level visibility and data science techniques to spot behaviors such as compromised systems and the use of covert channel communications, security teams can detect sophisticated threats faster.
A data covert channel may exist in the following two situations (Wang & Lee 2005):
Other topics include authentication of large data sets using Galois/counter mode, optimization of covert channel identification, lazy revocation in cryptographic file systems, and the OSD security protocol.