Skip to Content
Uncategorized

Detecting Covert Channels in Packet Delays

One of the classic ways to smuggle information out of a watched network is to encode the data in the time delays between packets that are sent. Vincent Berk, Annarita Giani, and George Cybenko at Dartmouth College just published a…

One of the classic ways to smuggle information out of a watched network is to encode the data in the time delays between packets that are sent.

Vincent Berk, Annarita Giani, and George Cybenko at Dartmouth College just published a technical report with techniques for ferreting out the use of such covert channels.

The problem with these channels, as the paper notes, is that they do not carry a lot of information. The advantage, of course, is that they are nearly invisible to most network managers.

Keep Reading

Most Popular

Here’s how a Twitter engineer says it will break in the coming weeks

One insider says the company’s current staffing isn’t able to sustain the platform.

Technology that lets us “speak” to our dead relatives has arrived. Are we ready?

Digital clones of the people we love could forever change how we grieve.

How to befriend a crow

I watched a bunch of crows on TikTok and now I'm trying to connect with some local birds.

Starlink signals can be reverse-engineered to work like GPS—whether SpaceX likes it or not

Elon said no thanks to using his mega-constellation for navigation. Researchers went ahead anyway.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.