Learn Backend Development Part-Time, Online
Learn EDR Internals: Research & Development From The Masters
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a conference talk on advanced data exfiltration techniques and malicious communication methods. Delve into covert channels, protocol channels, and protocol hopping covert channels. Learn about shared resource matrices, covert flow trees, and traffic normalization. Discover micro protocol engineering approaches and status update techniques. Examine packet forwarding examples and requirements for covert channel routing. Investigate agents and drones for overlay routing. Gain insights into BACnet protection and the implementation of multi-level security using an open-source BACnet firewall router. Access related publications to further expand your knowledge on these cutting-edge cybersecurity topics.
Syllabus
Intro
Typical Techniques for Covert Channels
Shared Resource Matrix
Covert Flow Trees
Traffic Normalization
Other Approaches
Summary (pt. 1)
Protocol Channels & Protocol Hopping Covert Channels
Terminology
Combining Multiple Layers
Micro Prot. Engineering Approach
Status Update Approach
Example: Packet Forwarding
Requirements for CC Routing
Agents and Drones for Overlay Routing
Summary (pt. 2)
BACnet Protection
Introducing MLS using the Open Source BACnet Firewall Router
Summary (pt. 3)
Related Publications
Taught by
WEareTROOPERS