Hybrid covert channel in LTE-A: Modeling and...

72
Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2019 How does chunking help working memory? Thalmann, Mirko ; Souza, Alessandra S ; Oberauer, Klaus Abstract: Chunking is the recoding of smaller units of information into larger, familiar units. Chunking is often assumed to help bypassing the limited capacity of working memory (WM). We investigate how chunks are used in WM tasks, addressing three questions: (a) Does chunking reduce the load on WM? Across four experiments chunking benefits were found not only for recall of the chunked but also of other not-chunked information concurrently held in WM, supporting the assumption that chunking reduces load. (b) Is the chunking benefit independent of chunk size? The chunking benefit was independent of chunk size only if the chunks were composed of unique elements, so that each chunk could be replaced by its first element (Experiment 1), but not when several chunks consisted of overlapping sets of elements, disabling this replacement strategy (Experiments 2 and 3). The chunk-size effect is not due to differences in rehearsal duration as it persisted when participants were required to perform articulatory suppression (Experiment 3). Hence, WM capacity is not limited to a fixed number of chunks regardless of their size. (c) Does the chunking benefit depend on the serial position of the chunk? Chunks in early list positions improved recall of other, not-chunked material, but chunks at the end of the list did not. We conclude that a chunk reduces the load on WM via retrieval of a compact chunk representation from long-term memory that replaces the representations of individual elements of the chunk. This frees up capacity for subsequently encoded material. DOI: https://doi.org/10.1037/xlm0000578 Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-151291 Journal Article Accepted Version Originally published at: Thalmann, Mirko; Souza, Alessandra S; Oberauer, Klaus (2019). How does chunking help working memory? Journal of Experimental Psychology: Learning, Memory, and Cognition, 45(1):37-55. DOI: https://doi.org/10.1037/xlm0000578

Transcript of Hybrid covert channel in LTE-A: Modeling and...

Page 1: Hybrid covert channel in LTE-A: Modeling and analysisisiarticles.com/bundles/Article/pre/pdf/152162.pdf · of covert channels are rapidly gaining popularity as the growing of cloud

Accepted Manuscript

Hybrid covert channel in LTE-A: Modeling and analysis

Guangliang Xu, Wei Yang, Liusheng Huang

PII: S1084-8045(18)30038-9

DOI: 10.1016/j.jnca.2018.02.001

Reference: YJNCA 2060

To appear in: Journal of Network and Computer Applications

Received Date: 13 May 2017

Revised Date: 15 December 2017

Accepted Date: 2 February 2018

Please cite this article as: Xu, G., Yang, W., Huang, L., Hybrid covert channel in LTE-A: Modeling andanalysis, Journal of Network and Computer Applications (2018), doi: 10.1016/j.jnca.2018.02.001.

This is a PDF file of an unedited manuscript that has been accepted for publication. As a service toour customers we are providing this early version of the manuscript. The manuscript will undergocopyediting, typesetting, and review of the resulting proof before it is published in its final form. Pleasenote that during the production process errors may be discovered which could affect the content, and alllegal disclaimers that apply to the journal pertain.

Page 2: Hybrid covert channel in LTE-A: Modeling and analysisisiarticles.com/bundles/Article/pre/pdf/152162.pdf · of covert channels are rapidly gaining popularity as the growing of cloud

MANUSCRIP

T

ACCEPTED

ACCEPTED MANUSCRIPT

Hybrid Covert Channel in LTE-A: Modeling and Analysis

Guangliang Xu∗, Wei Yang and Liusheng Huang

School of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, P.R. China.

Abstract

As a major approach to information leakage, covert channels are rapidly gaining popularity with the exponentially growing ofcloud computing and network resources. Long Term Evolution Advance (LTE-A) has dominated the 4th generation (4G) of mobiletelecommunication networks, however, this brings an elevation of the risk of covert channels. This paper constructs a Covert Chan-nel in LTE-A circumstance which can ensure the accuracy and effectiveness of the covert communication. Delayed Packet OneIndicator (DPOI) is a Covert Timing Channel (CTC) model evolved from classic network CTC. Firstly, we use High-level PetriNets (HLPN) to model the structure and behavior of the DPOI, especially the process of encoding/decoding and synchronization,according to which, we perform formal verification of the model’s major shortcomings. Secondly, we propose HYBRID DPOI, animproved hybrid covert channel model which introduced Covert Storage Channel (CSC) in MAC layer for synchronizing. More-over, we model the structure and behavior of the HYBRID DPOI using the HLPN to demonstrate the accuracy and effectivenessof our proposed model. At last, we analyze and evaluate the HYBRID DPOI. The results show that the proposed model in LTE-Acircumstance is reliable and effective, which provides a new idea for covert channel construction.

Keywords: Covert channel, High-level Petri Nets, LTE-A, Modeling, Reliablity.

1. Introduction

Establishing a pathway over an overt network resources toconceal secret data transmission is known as covert communi-cation. The term “covert channels” was first coined by Lamp-son (1973) and defined as the channels “not intended for infor-mation transfer at all”. In the Orange Book (Qiu et al., 1985),published by the U.S. Department of Defense, a covert channelis defined as “any communication channel that can be exploitedby a process to transfer information in a manner that violates thesystem’s security policy”. Covert channels can be constructedusing a variety of shared media. For example, utilizing networkresources, covert channels can transfer information hidden fromnetwork security features, such as firewalls. Since they embedcovert message bits in innocuous communications, the fact thatthe transition of secret information is taking place hidden fromovert channels and unsuspecting wardens.

As an illustration of the practical meaning of the covert chan-nel consider the famous prisoners’ problem described by Sim-mons (1984). The problem is as follows: two prisoners needto communicate to escape, but all the messages should passthrough the warden who can detect any encrypted messages.They must find some technique of hiding their secret messagesin an innocent-looking communication.

Cloud computing provides diverse services through variousnetworks. The proliferation of smartphone and portable deviceswith a wireless network access, is accelerating the development

∗Corresponding authorEmail addresses: [email protected] (Guangliang Xu),

{qubit, lshuang}@ustc.edu.cn (Wei Yang and Liusheng Huang)

of mobile-cloud computing. Mobile commerce, mobile health-care and mobile learning are some of the areas in which themobile-cloud computing can be utilized (Kirui, 2014). As amost advanced mobile cellular network, LTE-A is one of thenetwork support platform for the cloud computing applications,especially for the mobile-cloud computing. Extensive availabil-ity and development of cloud computing and mobile networkopen up the opportunity for abusing network resources to dis-tribute malicious data and leak sensitive information. Numer-ous researches (Wu et al., 2015; Enck et al., 2009; Wang et al.,2010; Shen et al., 2015b; Mazurczyk et al., 2013) have demon-strated that covert channels are a great threat to the informationsecurity of networks, cloud computing and mobile computing.Wu et al. (2015) designed a memory bus-based covert channelin the cloud, a pure timing-based data transmission scheme us-ing the bus locking mechanism. Based on the natural behaviorsof browsers, Shen et al. (2015b) designed a covert channel aim-ing at HTTP. Mazurczyk et al. (2013) discussed the methodsof utilizing prevalent internet applications and sharing servicessuch as Skype and BitTorrent to distribute secret data. This typeof covert channels are rapidly gaining popularity as the growingof cloud computing and mobile applications.

Including CSC and CTC, various covert channels for TCP/IPnetwork are presented in literatures. However, to the best ofour knowledge, very little research on the topic of covert chan-nel for LTE-A has been published so far, more importantly,most of which just discussed the protocol vulnerabilities may beused by covert communication, there are no modeling analysisaiming at the feasibility and reliability of the proposed LTE-Acovert channel scheme.

Preprint submitted to Elsevier February 6, 2018