Covert Channels In Tcp/Ip: Attack And Defence

No ratings

Presented at Chaos Communication Congress 22 by

This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.