diff --git a/bip_boop/related_work.svg b/bip_boop/related_work.svg index 81a9706..b182188 100644 --- a/bip_boop/related_work.svg +++ b/bip_boop/related_work.svg @@ -2,9 +2,9 @@ 2007Piggiback CC -use parts of an overt channel for covert info20202020201920172017≠ because restricted to mobile devices≠ because only from malware to attacker, unidirectional. -Evaluation of distance and interference influence. -Questions about permitted noise on power lines, could be interesting.≠ because restricted to mobile devices20192009??????20192019No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices≠ because communication between source and ≠ because communication between source and sink sink within a machine. + y="199.47291" + id="tspan6">within a machine.POWERT Channels: A Novel Class of Covert Communication Exploiting Power Management VulnerabilitiesDefinitely the most similar work. +≠ because only from malware to attacker, unidirectional. +Evaluation of distance and interference influence. +Questions about permitted noise on power lines, could be interesting.PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power LinesBitJabber: The World's Fastest Electromagnetic Covert ChannelA Survey of Covert Channels and Countermeasures in Computer Network ProtocolesFocuses on network protocoles so piggiback covert channels. Good to provide some context and definitions but not directly related.Come up with the concept of covert chqnnel with the prisoner's problem.The Prisoners’ Problem and the Subliminal ChannelDefine an "out-of-band" covert channel and their definition corresponds to some extent to what I do with power.On characterizing and measuring out-of-band covert channels1984Out-of-Band Covert Channels—A Survey20161969Invented the term "Covert Channel". +This is though of in the case of programms communicating on the same machine. It is the early days of the idea of covert channels in computer science.A note on the confinement problemGeneral work about covert channelsSpecific work about power covert channelsSoftware-based data ex-filtration via simple power analysisSurvey on covert channels in virtual machines and cloud computingStill about covert channels within a single computer but looks at cloud computing. Could be interesting so explain that covert channels are more relevant than ever in the cloud computing age.Very different because relying on electromagnetism as the medium. But interesting because the information supposedly goes beyond the walls of the room. Could be an interesting comparison with the bip-boop once we know how far we ca nread the info.2018Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical SystemsThey propose to use the actuators of a cyber-physical system to transmit informations. The channel is sound to extract proprietary information about the system.2016PLC is very appealing because it is cheap and require little additional infrastructure. +However, it requires both sender and receiver to have special sensors to extract comms. from power line.State of the Art in Power Line Communications: From the Applications to the Medium2009Argue that ARQ is better than FEC for error correction.Packet-oriented communication protocols for Smart Grid Services over low-speed PLCFind paper about importance of C2 server when deploying malware.???List of papers about covert channles using different channels: https://www.ohioinfosec.org/files/2021/covert_data_exfiltration/