Skip to Content
Uncategorized

Detecting Covert Channels in Packet Delays

One of the classic ways to smuggle information out of a watched network is to encode the data in the time delays between packets that are sent. Vincent Berk, Annarita Giani, and George Cybenko at Dartmouth College just published a…

One of the classic ways to smuggle information out of a watched network is to encode the data in the time delays between packets that are sent.

Vincent Berk, Annarita Giani, and George Cybenko at Dartmouth College just published a technical report with techniques for ferreting out the use of such covert channels.

The problem with these channels, as the paper notes, is that they do not carry a lot of information. The advantage, of course, is that they are nearly invisible to most network managers.

Keep Reading

Most Popular

The inside story of how ChatGPT was built from the people who made it

Exclusive conversations that take us behind the scenes of a cultural phenomenon.

How Rust went from a side project to the world’s most-loved programming language

For decades, coders wrote critical systems in C and C++. Now they turn to Rust.

Design thinking was supposed to fix the world. Where did it go wrong?

An approach that promised to democratize design may have done the opposite.

Sam Altman invested $180 million into a company trying to delay death

Can anti-aging breakthroughs add 10 healthy years to the human life span? The CEO of OpenAI is paying to find out.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.