covert channel


Also found in: Wikipedia.

covert channel

A transfer of information that violates a computer's built-in security systems. A covert storage channel refers to depositing information in a memory or storage location that can be accessed by different security clearances. A covert timing channel is the manipulation of a system resource in such a way that it can be detected by another process.
References in periodicals archive ?
As the practical covert channel detection requires small window-size, the number of the observed IPDs is set to l = 2000.
"If the server is compromised and the implanted chip in the power supply system is activated, the power lines could serve as a covert channel to transmit data," commented Philippe Lin, senior threat researcher at the cybersecurity company Trend Micro.
The main area of study in the modern steganography, consequently are in the network steganography, also, are the covert channels. A covert channel is any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy [2].
Also, because header names are case-insensitive in the HTTP/l.x, one can use different capitalization for the header field values for covert channel [8].
Israel's intelligence effort, they say, began in 2012, when the Obama administration first opened a covert channel with Tehran.
The Times said the technology had been in use since at least 2008 and relied on a covert channel of radio waves transmitted from tiny circuit boards and USB cards secretly inserted in the computers.
In this paper we reveal one such covert channel on Android platform of relatively low permission requirements and hence more stealthiness compared with other exposed channels so far.
Among the topics are RFID standards, hardware attacks, an overview of cryptography, privacy versus performance in denial-of-service attacks on RFID systems, and covert channel attacks in RFID-enabled supply chains.
Research into Network Situational Awareness and Computer Network Defense has thrown up many areas for consideration but one critical area that has emerged is that of Covert Channel operation and in particular, the 'stealth' activity of Data Exfiltration.
Silently sending SMS messages can create a covert channel for siphoning sensitive information from a device.
British intelligence twice rebuffed attempts by the secret wartime opposition in Nazi Germany to open up a covert channel of communications.
Other features include simultaneous recording and playback, timer recording, alarm and pre-alarm recording, a covert channel function for sensitive applications, and built-in motion detection.