Cross-router covert channels

Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren

Research output: Contribution to conferencePaperpeer-review

2 Scopus citations

Abstract

Many organizations protect secure networked devices from non-secure networked devices by assigning each class of devices to a different logical network. These two logical networks, commonly called the host network and the guest network, use the same router hardware, which is designed to isolate the two networks in software. In this work we show that logical network isolation based on host and guest networks can be overcome by the use of cross-router covert channels. Using specially-crafted network traffic, these channels make it possible to leak data between the host network and the guest network, and vice versa, through the use of the router as a shared medium. We performed a survey of routers representing multiple vendors and price points, and discovered that all of the routers we surveyed are vulnerable to at least one class of covert channel. Our attack can succeed even if the attacker has very limited permissions on the infected device, and even an iframe hosting malicious JavaScript code can be used for this purpose. We provide several metrics for the effectiveness of such channels, based on their pervasiveness, rate and covertness, and discuss possible ways of identifying and preventing these leakages.

Original languageEnglish
StatePublished - 1 Jan 2019
Event13th USENIX Workshop on Offensive Technologies, WOOT 2019, co-located with USENIX Security 2019 - Santa Clara, United States
Duration: 12 Aug 201913 Aug 2019

Conference

Conference13th USENIX Workshop on Offensive Technologies, WOOT 2019, co-located with USENIX Security 2019
Country/TerritoryUnited States
CitySanta Clara
Period12/08/1913/08/19

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems

Fingerprint

Dive into the research topics of 'Cross-router covert channels'. Together they form a unique fingerprint.

Cite this