Javascript must be enabled to continue!
Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems
View through CrossRef
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two entities that are not authorized to share data. The secret data is encoded into different forms of signals, such as delay, temperature, or hard drive location. These signals and information are then decoded by the receiver to retrieve the secret data, thereby mitigating some of the existing security measures. The important steps of covert channel attacks are described, such as data encoding, communication protocol, data decoding, and models to estimate communication bandwidth and bit error rate. Countermeasures against covert channels and existing covert channel detection techniques are also summarized. In the second part of the paper, the implications of such attacks for emerging packaging technologies, such as 2.5D/3D integration are discussed. Several covert channel threat models for 2.5D/3D ICs are also proposed.
Title: Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems
Description:
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided.
Such covert channels establish a communication link between two entities that are not authorized to share data.
The secret data is encoded into different forms of signals, such as delay, temperature, or hard drive location.
These signals and information are then decoded by the receiver to retrieve the secret data, thereby mitigating some of the existing security measures.
The important steps of covert channel attacks are described, such as data encoding, communication protocol, data decoding, and models to estimate communication bandwidth and bit error rate.
Countermeasures against covert channels and existing covert channel detection techniques are also summarized.
In the second part of the paper, the implications of such attacks for emerging packaging technologies, such as 2.
5D/3D integration are discussed.
Several covert channel threat models for 2.
5D/3D ICs are also proposed.
Related Results
En skvatmølle i Ljørring
En skvatmølle i Ljørring
A Horizontal Mill at Ljørring, Jutland.Horizontal water-mills have been in use in Jutland since the beginning of the Christian era 2). But the one here described shows so close a c...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Background: The covert or indirect type of aggression has a risk of converting in violent acts and, considering that, it is very important to identify it in order to apply effectiv...
Wireless Covert Channel With Polarized Dirty Constellation in Backscatter Communication
Wireless Covert Channel With Polarized Dirty Constellation in Backscatter Communication
Abstract
Ambient backscatter communication has become a low-cost and green solution to next-generation Internet-of-Things (IoT). In this paper, we investigate a problem of ...
Machine-Learning Based Channel Quality and Stability Estimation for Stream-Based Multichannel Wireless Sensor Networks
Machine-Learning Based Channel Quality and Stability Estimation for Stream-Based Multichannel Wireless Sensor Networks
Wireless sensor networks (WSNs) have become more and more diversified and are today able to also support high data rate applications, such as multimedia. In this case, per-packet c...
Communication Management
Communication Management
The question of what comprises communication management has caused numerous discussions among communication scholars representing different theoretical and disciplinary angles. Com...
Research on Cybersecurity Threat Prediction and Prevention Technology for Intelligent Housing Combined with Edge Computing
Research on Cybersecurity Threat Prediction and Prevention Technology for Intelligent Housing Combined with Edge Computing
As an important application scenario for the development of Internet of Things (IoT) technology, smart housing is facing unprecedented challenges in its network security. The tradi...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...

