YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: SoNIC Steganography

SoNIC SteganographyPresenter: Hector Tosado

Advisor: Professor Hakim WeatherspoonCornell University TRUST REU Program

Page 2: SoNIC Steganography

Introduction Steganography is the art and science

of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.

1’s and 0’s

Page 3: SoNIC Steganography

SoNIC Steganography

Page 4: SoNIC Steganography

Introduction SoNIC Steganography Network Stack SoNIC Hector Codes Results Conclusion Acknowledgements

Agenda

Page 5: SoNIC Steganography

Network Stack Open Systems Interconnection Model (OSI)

PHY Layer – Generate and detect signals for transmit

Page 6: SoNIC Steganography

SoNIC SoNIC (Software Network Interface

Card).

Software – What is sent

Hardware – How it’s sent

Real-Time

Page 7: SoNIC Steganography

10G Ethernet

6 bit representation of each letter and symbol

100 0000 - @ – 00 0000 - A 100 1111 - O – 00 1111 - P

Hector Codes

Page 8: SoNIC Steganography

Hector Codes Encode / Scramble Descramble / Decode

Page 9: SoNIC Steganography

Results

Page 10: SoNIC Steganography

Results Router Limitation

None Invasive

Character Limitation

Page 11: SoNIC Steganography

Conclusion Hector Codes allows for yet another

use for SoNIC.

Hard to detect hidden message.

Allows for greater network efficiency.

Page 12: SoNIC Steganography

Lessons Learned C Language

Whiteboard

LaTeX

Terminal

Page 13: SoNIC Steganography

Acknowledgements Hakim Weatherspoon

Ki Suh Lee

Han Wang

LSAMP

TRUST

Cornell University

Page 14: SoNIC Steganography

Contact information Héctor A. Tosado

Jimenez › [email protected]

Professor Hakim Weatherspoon› [email protected]

u Ki Suh Lee

[email protected] Han Wang

[email protected]

Page 15: SoNIC Steganography

Questions


Related Documents