Covert channels in TCP/IP: attack and defence (22c3)

Item

Title
Covert channels in TCP/IP: attack and defence (22c3)
Description
This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.

about this event: https://hacker-archive.org/assets/22C3/fahrplan/events/798.en.html
originalMediaLink
https://cdn.media.ccc.de/congress/2005/lectures/video/mp4-avc/320x240/22C3-798-en-tcpip_covert_channels.m4v
Beteiligte Person
Steven J. Murdoch
Is Referenced By
22C3 Fahrplan
Extent
00:42:35
Type
video/mp4
Abstract
This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.

about this event: https://hacker-archive.org/assets/22C3/fahrplan/events/798.en.html