Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Theses/Dissertations

Clemson University

Hidden markov models

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Timing Side-Channel Attacks On Ssh, Harikrishnan Bhanu May 2010

Timing Side-Channel Attacks On Ssh, Harikrishnan Bhanu

All Theses

In most secure communication standards today, additional latency is kept to a minimum to preserve the Quality-of-Service. As a result, it is possible to mount side-channel attacks using timing analysis. In this thesis we discuss the viability of these attacks, and demonstrate them by inferring Hidden Markov Models of protocols. These Hidden Markov Models can be used to both detect protocol use and infer information about protocol state. We create experiments that use Markov models to generate traffic and show that we can accurately reconstruct models under many circumstances. We analyze what occurs when timing delays have enough jitter that …