Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

@article{Mileva2021ComprehensiveAO,
  title={Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels},
  author={Aleksandra Mileva and Aleksandar Velinov and Laura Hartmann and Steffen Wendzel and Wojciech Mazurczyk},
  journal={Comput. Secur.},
  year={2021},
  volume={104},
  pages={102207}
}
A Revised Taxonomy of Steganography Embedding Patterns
TLDR
This paper reviews both the terminology and the taxonomy of hiding patterns as to make them more general and focuses on embedding hiding patterns and showing how they can be applied to multiple domains of steganography instead of being limited to the network scenario.
A Revised Taxonomy of Steganography Embedding Patterns
TLDR
This paper reviews both the terminology and the taxonomy of hiding patterns as to make them more general and focuses on embedding hiding patterns and showing how they can be applied to multiple domains of steganography instead of being limited to the network scenario.
A Systematic Analysis of Covert Channels in the Network Time Protocol
TLDR
This work presents a systematic in-depth analysis of covert channels by modification for the Network Time Protocol (NTP), and shows in its first assessment that practically undetectable channels can be implemented in NTP, motivating the required further research.
Reset- and Reconnection-based Covert Channels in CoAP
The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) are fast growing areas. Therefore, several protocols are specifically designed for these domains. CoAP (Constrained

References

SHOWING 1-10 OF 34 REFERENCES
Burglars’ IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds
TLDR
It is found that major IoT clouds put in place for the arguably most popular messaging protocol - MQTT are all vulnerable, allowing the adversary to gain control of the device, launch a large-scale denial-of-service attack, steal the victim’s secrets data and fake the victim's device status for deception.
Covert Channels in the MQTT-Based Internet of Things
TLDR
This work presents the first comprehensive study of covert channels in a protocol utilizing the publish-subscriber model, i.e., the Message Queuing Telemetry Transport (MQTT) protocol which is widely deployed in Internet of Things (IoT) environments and proves that MQTT-based covert channels are practically feasible and effective.
Covert Data Exfiltration Using Light and Power Channels
TLDR
This work demonstrates three separate covert channels, consisting of current utilization, luminosity and hue, and analyzes the identified channels for throughput, generality and stealthiness, and reports transmission speeds of up to 832 bps.
Detection of Size Modulation Covert Channels Using Countermeasure Variation
TLDR
Countermeasure variation is a slight modification of a given countermeasure that was designed to detect covert channels of one specific hiding pattern so that thecountermeasure can also detect hidden channels that are representing other hiding patterns.
Sensing Danger: Exploiting Sensors to Build Covert Channels
TLDR
A novel attack scenario that uses unsecured embedded sensors to build covert channels that can be used to bypass security mechanisms and transfer information between isolated processes is presented and it is believed that the presented exploits pose a significant security risk for any sensor-equipped device.
TACAN: transmitter authentication through covert channels in controller area networks
TLDR
TACAN (Transmitter Authentication in CAN) provides secure authentication of ECUs by exploiting the covert channels without introducing CAN protocol modifications or traffic overheads (i.e., no extra bits or messages are used).
The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems
TLDR
It is shown how a corrupt actuator in one zone can send covert information to a sensor in a different zone, breaking the isolation, and may allow an attack where the actuator is intentionally malfunctioning, and the sensor is intentionally masking the malfunction.
The chatty-sensor: a provably-covert channel in cyber physical systems
TLDR
The first provably-covert channel from a 'covert-transmitting sensor' to a ' covertly-receiving actuator', interacting only indirectly, via a benign threshold-based controller is presented.
Building packet length covert channel over mobile VoIP traffics
TLDR
Construction of covert channel is proposed via partitioning the length distribution of legitimate packet traffics and mapping packet length partitions to data symbols and the reliable data transmission is guaranteed by precoding the hidden data into a HDLC-like frame structure.
Covert Channels in IoT Deployments Through Data Hiding Techniques
TLDR
This position paper introduces the usage of convert channels, built on information hiding techniques, in IoT scenarios and argues that convert channels built by leveraging information hidden techniques could be exploited.
...
1
2
3
4
...