Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2015, Issue 8, Pages 83–85
DOI: https://doi.org/10.17223/2226308X/8/31
(Mi pdma219)
 

Mathematical Foundations of Computer Security

Implementation of covert timing channels based on HTTP cache headers in cloud file storage services

D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov

Tomsk State University, Tomsk
References:
Abstract: It is shown how covert timing channels based on HTTP cache headers can be implemented in cloud file storage services. Most of the cloud file storages like Google Drive allow users to operate with cache-control headers, particularly with files' ETags. So it is possible to implement covert timing channel based on ETag cache header. Consider two man-in-the-browser attackers, $s_1$ and $s_3$, located on different hosts, and fully trusted web server, accessible via https://drive.google.com/drive, with some file hosted on it. The only requirement for covert channel is that the file should be accessible for writing to $s_1$ and for reading to $s_3$. The attacker $s_1$ sends a request to Google Drive API (POST request to https://www.googleapis.com/drive/v2/files/fileId/touch) to modify the file's last access time (and hence ETag). Then the attacker $s_3$ sends a request to Google Drive API (GET request to https://www.googleapis.com/drive/v2/files/fileId) to get the file’s metadata including ETag. If the recieved header value is the same as before, $s_3$ considers that he get bit 1, otherwise (when file has been changed and header values do not match) $s_3$ considers that he get bit 0. This method allows to increase channel's throughput (in comparison with some other methods) and provides the anonymity for communications between attackers $s_1$ and $s_3$.
Keywords: HTTP, covert channels, web-application security, botnets.
Document Type: Article
UDC: 004.94
Language: Russian
Citation: D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “Implementation of covert timing channels based on HTTP cache headers in cloud file storage services”, Prikl. Diskr. Mat. Suppl., 2015, no. 8, 83–85
Citation in format AMSBIB
\Bibitem{KolBroOle15}
\by D.~N.~Kolegov, O.~V.~Broslavsky, N.~E.~Oleksov
\paper Implementation of covert timing channels based on HTTP cache headers in cloud file storage services
\jour Prikl. Diskr. Mat. Suppl.
\yr 2015
\issue 8
\pages 83--85
\mathnet{http://mi.mathnet.ru/pdma219}
\crossref{https://doi.org/10.17223/2226308X/8/31}
Linking options:
  • https://www.mathnet.ru/eng/pdma219
  • https://www.mathnet.ru/eng/pdma/y2015/i8/p83
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
    Statistics & downloads:
    Abstract page:139
    Full-text PDF :203
    References:34
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024