Chupja: Making a covert channel on the Internet

Chupja: Making a covert channel on the Internet
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

Cornell Chronicle: “When you send a message on the Internet, your computer encodes letters, numbers and other data into strings of ones and zeroes and organizes them into “packets” that contain an address and other identifying information followed by a chunk of content. Your computer sees the ones and zeroes as different voltages, but a network interface translates them into pulses of light that it injects into optical fiber to send across town or across the country, with a pulse representing 1 and no pulse representing 0. At the receiving end, similar hardware translates the pulses of light into electrical signals for a computer that gathers related packets together and extracts the message.


The network standard is to insert at least 12 “idle characters” – just a string of zeroes – between packets. A message can be hidden in the data stream by varying the length of that space. Making it longer than normal can represent a one, shorter a zero. When this is done by software, an administrator monitoring the network can easily detect it; a statistical analysis of the traffic will reveal patterns in the timing. A network also can be designed to jam such covert channels by regulating interpacket delays.

Weatherspoon and graduate students Ki Suh Lee and Han Wang created their covert channel, which they call Chupja – a Korean word for spy – at the hardware level, using a network interface card designed by Weatherspoon that allows precise software control over optical signals. A receiver with similar capability can detect the timing variations and read the message, but off-the-shelf hardware used by most networks discards the idle characters before passing packets along to the receiving computer, so the message is invisible to an administrator’s monitoring software.

Conventional hardware measures interpacket delays in milliseconds, but a Chupja channel varies them by picoseconds, Weatherspoon explained. Creating the covert channel is an exercise in balance, he added. The variation must be small enough to avoid detection, but large enough to survive minor delays and distortions as the signal goes through network routers.


In tests, the researchers sent covert messages over thousands of miles and many “hops” on the National Lambda Rail research network – from Ithaca to New York City to Cleveland, Chicago, Boston and back – with less than a 10 percent error rate, which can be managed by standard error-correcting software. Bandwidth is more than 80 kilobits per second. “We’re able to send very complex messages,” Weatherspoon said. “You can do the things you’re used to doing, like looking at websites, but do so covertly.”

To protect or prevent such covert channels, the researchers concluded, administrators will have to deploy hardware that can monitor traffic at a finer-grained level.

The work was supported primarily by the Defense Advanced Research Projects Administration and the National Science Foundation.”

Source: Cornell University – Cornell Chronicle. Bill Steele. June 3rd 2014.
Photo Credits: Fibres – Red 7 by Chris Searle / FlickR