Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
162 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

ABC-Channel: An Advanced Blockchain-based Covert Channel (2403.06261v2)

Published 10 Mar 2024 in cs.CR

Abstract: Establishing efficient and robust covert channels is crucial for secure communication within insecure network environments. With its inherent benefits of decentralization and anonymization, blockchain has gained considerable attention in developing covert channels. To guarantee a highly secure covert channel, channel negotiation should be contactless before the communication, carrier transaction features must be indistinguishable from normal transactions during the communication, and communication identities must be untraceable after the communication. Such a full-lifecycle covert channel is indispensable to defend against a versatile adversary who intercepts two communicating parties comprehensively (e.g., on-chain and off-chain). Unfortunately, it has not been thoroughly investigated in the literature. We make the first effort to achieve a full-lifecycle covert channel, a novel blockchain-based covert channel named ABC-Channel. We tackle a series of challenges, such as off-chain contact dependency, increased masquerading difficulties as growing transaction volume, and time-evolving, communicable yet untraceable identities, to achieve contactless channel negotiation, indistinguishable transaction features, and untraceable communication identities, respectively. We develop a working prototype to validate ABC-Channel and conduct extensive tests on the Bitcoin testnet. The experimental results demonstrate that ABC-Channel achieves substantially secure covert capabilities. In comparison to existing methods, it also exhibits state-of-the-art transmission efficiency.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (53)
  1. J. Tian, G. Xiong, Z. Li, and G. Gou, “A survey of key technologies for constructing network covert channel,” Security and Communication Networks, 2020.
  2. A. Mileva, A. Velinov, L. Hartmann, S. Wendzel, and W. Mazurczyk, “Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels,” Computers & security, 2021.
  3. H. Binsalleeh, A. M. Kara, A. Youssef, and M. Debbabi, “Characterization of covert channels in DNS,” in Proc. IEEE NTMS, 2014.
  4. M. Nazari, S. Tarahomi, and S. Aliabady, “A Lightweight Adaptable DNS Channel for Covert Data Transmission,” arXiv preprint arXiv:2003.14094, 2020.
  5. M. Zhan, Y. Li, G. Yu, B. Li, and W. Wang, “Detecting DNS over HTTPS based data exfiltration,” Computer Networks, 2022.
  6. M. Nasr, A. Bahramali, and A. Houmansadr, “Deepcorr: Strong flow correlation attacks on tor using deep learning,” in Proc. ACM CCS, 2018.
  7. I. Karunanayake, N. Ahmed, R. Malaney, R. Islam, and S. K. Jha, “De-anonymisation attacks on Tor: A Survey,” IEEE Communications Surveys & Tutorials, 2021.
  8. S. E. Oh, T. Yang, N. Mathews, J. K. Holland, M. S. Rahman, N. Hopper, and M. Wright, “DeepCoFFEA: Improved flow correlation attacks on Tor via metric learning and amplification,” in Proc. IEEE SP, 2022.
  9. S. Cabuk, C. E. Brodley, and C. Shields, “IP covert timing channels: design and detection,” in Proc. ACM CCS, 2004.
  10. H. Seong, I. Kim, Y. Jeon, M.-K. Oh, S. Lee, and D. Choi, “Practical covert wireless unidirectional communication in ieee 802.11 environment,” IEEE Internet of Things Journal, 2022.
  11. L. Zhu, Q. Liu, Z. Chen, C. Zhang, F. Gao, and Z. Yang, “A Novel Covert Timing Channel Based on Bitcoin Messages,” IEEE Transactions on Computers, 2023.
  12. H. Cao, H. Yin, F. Gao, Z. Zhang, B. Khoussainov, S. Xu, and L. Zhu, “Chain-based covert data embedding schemes in blockchain,” IEEE Internet of Things Journal, 2020.
  13. “Bitcoin: A Peer-to-Peer Electronic Cash System,” [Online], 2023, Available:https://bitcoin.org/bitcoin.pdf.
  14. T. Zhang, B. Li, Y. Zhu, T. Han, and Q. Wu, “Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions,” Computer Communications, 2023.
  15. S. T. Ali, P. McCorry, P. H.-J. Lee, and F. Hao, “Zombiecoin 2.0: managing next-generation botnets using bitcoin,” International Journal of Information Security, 2018.
  16. D. Frkat, R. Annessi, and T. Zseby, “Chainchannels: Private botnet communication over public blockchains,” in Proc. IEEE Things & GreenCom & CPSCom & SmartData, 2018.
  17. Z. Chen, L. Zhu, P. Jiang, C. Zhang, F. Gao, J. He, D. Xu, and Y. Zhang, “Blockchain Meets Covert Communication: A Survey,” IEEE Communications Surveys & Tutorials, 2022.
  18. S. Zheng, C. Yin, and B. Wu, “Keys as secret messages: Provably secure and efficiency-balanced steganography on blockchain,” in Proc. IEEE ISPA/BDCloud/SocialCom/SustainCom, 2021.
  19. K. Toyoda, P. T. Mathiopoulos, and T. Ohtsuki, “A novel methodology for hyip operators’ bitcoin addresses identification,” IEEE Access, 2019.
  20. D. Ermilov, M. Panov, and Y. Yanovich, “Automatic bitcoin address clustering,” in Proc. IEEE ICMLA, 2017.
  21. Y. Xiang, Y. Lei, D. Bao, W. Ren, T. Li, Q. Yang, W. Liu, T. Zhu, and K.-K. R. Choo, “Babd: A bitcoin address behavior dataset for pattern analysis,” arXiv preprint arXiv:2204.05746, 2022.
  22. F. Gao, L. Zhu, K. Gai, C. Zhang, and S. Liu, “Achieving a covert channel over an open blockchain network,” IEEE Network, 2020.
  23. Z. Guo, L. Shi, M. Xu, and H. Yin, “MRCC: a practical covert channel over Monero with provable security,” IEEE Access, 2021.
  24. J. Tian, G. Gou, C. Liu, Y. Chen, G. Xiong, and Z. Li, “DLchain: A covert channel over blockchain based on dynamic labels,” in Proc. Springer ICICS, 2020.
  25. J. Partala, “Provably secure covert communication on blockchain,” Cryptography, 2018.
  26. L. Liu, L. Liu, B. Li, Y. Zhong, S. Liao, and L. Zhang, “MSCCS: a Monero-based security-enhanced covert communication system,” Computer Networks, 2022.
  27. T. Tiemann, S. Berndt, T. Eisenbarth, and M. Liskiewicz, “Act natural!: Having a Private Chat on a Public Blockchain,” Cryptology ePrint Archive, 2021.
  28. “bip-0032.mediawiki,” [Online], 2023, Available:https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki.
  29. “bip-0044.mediawiki,” [Online], 2023, Available:https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki.
  30. A. Young and M. Yung, “Kleptography: Using cryptography against cryptography,” in Proc. Springer EUROCRYPT, 1997.
  31. G. J. Simmons, “The prisoners’ problem and the subliminal channel,” in Proc. Springer CRYPTO, 1984.
  32. N. Patki, R. Wedge, and K. Veeramachaneni, “The Synthetic data vault,” in Proc. IEEE DSAA, 2016.
  33. “blockchair,” [Online], 2023, Available:https://gz.blockchair.com/bitcoin/transactions/.
  34. R. Michalski, P. Macek, and D. Dziubałtowska, “Bitcoin addresses and their categories,” 2020. [Online]. Available: https://doi.org/10.7910/DVN/KEWU0N
  35. “Blockchain ledger API,” [Online], 2023, Available:https://developer.bitaps.com/blockchain.
  36. Y. Lan, F. Zhang, and H. Tian, “Using Monero to realize covert communication,” Journal of Xidian University, 2020.
  37. Y. Li, Y. Cai, H. Tian, G. Xue, and Z. Zheng, “Identifying illicit addresses in bitcoin network,” in Proc. Springer BlockSys, 2020.
  38. P. Koshy, D. Koshy, and P. McDaniel, “An analysis of anonymity in bitcoin using p2p network traffic,” in Proc. Springer FC, 2014.
  39. V. Wallace and S. Scott-Hayward, “Can SDN deanonymize Bitcoin users?” in Proc. IEEE ICC, 2020.
  40. A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in bitcoin p2p network,” in Proc. ACM CCS, 2014.
  41. S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage, “A fistful of bitcoins: characterizing payments among men with no names,” in Proc. ACM IMC, 2013.
  42. A. Biryukov and S. Tikhomirov, “Deanonymization and linkability of cryptocurrency transactions based on network analysis,” in Proc. IEEE EuroS&P, 2019.
  43. J. Yin, X. Cui, C. Liu, Q. Liu, T. Cui, and Z. Wang, “CoinBot: A covert botnet in the cryptocurrency network,” in Proc. Springer ICICS, 2020.
  44. S. Huang, W. Zhang, X. Yu, J. Wang, W. Song, and B. Li, “Covert communication scheme based on Bitcoin transaction mechanism,” Security and Communication Networks, 2021.
  45. F. Franzoni, I. Abellan, and V. Daza, “Leveraging bitcoin testnet for bidirectional botnet command and control systems,” in Proc. Springer FC, 2020.
  46. X. Luo, P. Zhang, M. Zhang, H. Li, and Q. Cheng, “A novel covert communication method based on bitcoin transaction,” IEEE Transactions on Industrial Informatics, 2021.
  47. A. Gaihre, Y. Luo, and H. Liu, “Do bitcoin users really care about anonymity? an analysis of the bitcoin transaction graph,” in Proc. IEEE BigData, 2018.
  48. A. Biryukov and S. Tikhomirov, “Transaction clustering using network traffic analysis for bitcoin and derived blockchains,” in Proc. IEEE INFOCOM WKSHPS, 2019.
  49. S. Liu, Z. Fang, F. Gao, B. Koussainov, Z. Zhang, J. Liu, and L. Zhu, “Whispers on ethereum: Blockchain-based covert data embedding schemes,” in Proc. ACM BSCI, 2020.
  50. M. Baden, C. F. Torres, B. B. F. Pontiveros, and R. State, “Whispering botnet command and control instructions,” in Proc. IEEE CVCBT, 2019.
  51. M. Gimenez-Aguilar, J. M. De Fuentes, L. González-Manzano, and C. Camara, “Zephyrus: An information hiding mechanism leveraging Ethereum data fields,” IEEE Access, 2021.
  52. A. Biryukov, D. Feher, and G. Vitto, “Privacy aspects and subliminal channels in zcash,” in Proc. ACM CCS, 2019.
  53. A. Kurt, E. Erdin, M. Cebe, K. Akkaya, and A. S. Uluagac, “LNBot: a covert hybrid botnet on bitcoin lightning network for fun and profit,” in Proc. Springer ESORICS, 2020.

Summary

We haven't generated a summary for this paper yet.