Secure Covert Channels in Multiplayer Games

被引:0
|
作者
Diehl, Malte [1 ]
机构
[1] Carl von Ossietzky Univ Oldenburg, Dept Comp Sci, D-26111 Oldenburg, Germany
关键词
Steganography; game theory; information theory; information hiding; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the art of hidden communication. In recent years, some publications presented approaches to transmit hidden information for different purposes via covert channels provided by games. These approaches used rather ad-hoc techniques to reach their objectives without establishing notions of steganographic security in their domain and applying them to review their solution. Therefore, this paper both theoretically and practically tackles the question how to implement secure steganography for games. First, we recall the necessary game-theoretic basics from which we derive a notion of steganographic security for game-based methods that depends on strategy imitation. This is followed by a general information-theoretic analysis of games to calculate the total amount of information that is sent during a game and the share that can be used securely for game-theoretic steganography. Second, based on our game-theoretic framework, we present a secure steganographic system for a simplified version of poker that serves as a proof of concept. Its features are evaluated and compared to the theoretical results. Despite its security, the system can replace over 50% of the cover data with steganographic information. Further advantages of our method are that no large cover messages are needed and that it can be used for steganographic streaming.
引用
下载
收藏
页码:117 / 122
页数:6
相关论文
共 50 条
  • [1] Covert Channels in Multiplayer First Person Shooter Online Games
    Zander, Sebastian
    Armitage, Grenville
    Branch, Philip
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 204 - 211
  • [2] Reliable Transmission Over Covert Channels in First Person Shooter Multiplayer Games
    Zander, Sebastian
    Armitage, Grenville
    Branch, Philip
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 169 - 176
  • [3] Secure Peer-to-Peer Trading for Multiplayer Games
    GauthierDickey, Chris
    Ritzdorf, Craig
    2012 11TH ANNUAL WORKSHOP ON NETWORK AND SYSTEMS SUPPORT FOR GAMES (NETGAMES), 2012,
  • [4] ON THE IDENTIFICATION OF COVERT STORAGE CHANNELS IN SECURE SYSTEMS
    TSAI, CR
    GLIGOR, VD
    CHANDERSEKARAN, CS
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (06) : 569 - 580
  • [5] Covert channels for collusion in online computer games
    Murdoch, SJ
    Zielinski, P
    INFORMATION HIDING, 2004, 3200 : 355 - 369
  • [6] Detecting Covert Channels in FPS Online Games
    Zander, Sebastian
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 555 - 558
  • [7] Quantum-secure covert communication on bosonic channels
    Bash, Boulat A.
    Gheorghe, Andrei H.
    Patel, Monika
    Habif, Jonathan L.
    Goeckel, Dennis
    Towsley, Don
    Guha, Saikat
    NATURE COMMUNICATIONS, 2015, 6
  • [8] SecSyslog: An approach to secure logging based on covert channels
    Forte, DV
    Maruti, C
    Vetturi, MR
    Zambelli, M
    FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, : 248 - 263
  • [9] Quantum-secure covert communication on bosonic channels
    Boulat A. Bash
    Andrei H. Gheorghe
    Monika Patel
    Jonathan L. Habif
    Dennis Goeckel
    Don Towsley
    Saikat Guha
    Nature Communications, 6
  • [10] Covert Channels in Online Rogue-like Games
    Lakhani, Hasnain
    Zaffar, Fareed
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 761 - 767