Fingerprint embedding: A proactive strategy of detecting timing channels

Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing

Research output: Chapter in Book/Report/Conference proceedingConference contribution


The detection of covert timing channels is notoriously a difficult work due to the high variation of network traffic. The existing detection methods, mainly based on statistical tests, cannot effectively detect a variety of covert timing channels. In this paper, we propose a proactive strategy of detecting covert timing channels. The basic idea is that a timing fingerprint is embedded into outgoing traffic of the to-be-protected host in advance. The presence of a covert timing channel is exposed, provided that the fingerprint is absent from the traffic during transmission. As a proof of concept, we design and implement a detection system, which consists of two modules for fingerprint embedding and checking, respectively. We also perform a series of experiments to validate if this system works effectively. The results show that it detects various timing channels accurately and quickly, while has less than 2.4‰ degradation on network performance.

Original languageEnglish (US)
Title of host publicationInformation and Communications Security - 15th International Conference, ICICS 2013, Proceedings
Number of pages16
StatePublished - 2013
Event15th International Conference on Information and Communications Security, ICICS 2013 - Beijing, China
Duration: Nov 20 2013Nov 22 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8233 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other15th International Conference on Information and Communications Security, ICICS 2013

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Fingerprint embedding: A proactive strategy of detecting timing channels'. Together they form a unique fingerprint.

Cite this