Information Hiding Using Improper frame padding

  title={Information Hiding Using Improper frame padding},
  author={B. Jankowski and W. Mazurczyk and K. Szczypiorski},
  journal={2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)},
  • B. Jankowski, W. Mazurczyk, K. Szczypiorski
  • Published 2010
  • Computer Science
  • 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)
  • Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper… CONTINUE READING
    42 Citations
    PadSteg: introducing inter-protocol steganography
    • 36
    • PDF
    Secure Data Communication Using Protocol Steganography in IPv6
    • Sandip Bobade, R. Goudar
    • Computer Science
    • 2015 International Conference on Computing Communication Control and Automation
    • 2015
    • 10
    • Highly Influenced
    An adaptive approach to detecting behavioural covert channels in IPv6
    • A. Salih
    • Engineering, Computer Science
    • 2017
    Novel network steganography approaches for confidential transmission of information
    Network packet payload parity based steganography
    • 13
    • PDF
    An Overview of Advanced Network Steganography
    On information hiding in retransmissions
    • 10
    • PDF


    Practical Data Hiding in TCP/IP
    • 278
    • PDF
    Embedding Covert Channels into TCP/IP
    • 311
    • PDF
    A survey of covert channels and countermeasures in computer network protocols
    • 420
    • PDF
    Practical Internet Steganography : Data Hiding in IP
    • 79
    • PDF
    Hiding Data in the OSI Network Model
    • 253
    • PDF
    Information hiding-a survey
    • 2,565
    • PDF
    Steganography of VoIP Streams
    • 117
    • PDF
    Covert Channels in LAN Protocols
    • 87
    • Highly Influential
    Covert Channels in IPv6
    • 113
    Eliminating Steganography in Internet Traffic with Active Wardens
    • 190
    • PDF