1 / 15

SoNIC Steganography

SoNIC Steganography. Presenter: Hector Tosado Advisor: Professor Hakim Weatherspoon Cornell University TRUST REU Program. Introduction.

tybalt
Download Presentation

SoNIC Steganography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SoNICSteganography Presenter: Hector Tosado Advisor: Professor Hakim Weatherspoon Cornell University TRUST REU Program

  2. Introduction • Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. • 1’s and 0’s

  3. SoNICSteganography

  4. Agenda • Introduction • SoNICSteganography • Network Stack • SoNIC • Hector Codes • Results • Conclusion • Acknowledgements

  5. Network Stack • Open Systems Interconnection Model (OSI) • PHY Layer – Generate and detect signals for transmit

  6. SoNIC • SoNIC (Software Network Interface Card). • Software – What is sent • Hardware – How it’s sent • Real-Time

  7. 10G Ethernet Hector Codes • 6 bit representation of each letter and symbol • 100 0000 - @ – 00 0000 - A • 100 1111 - O – 00 1111 - P

  8. Hector Codes • Encode / Scramble • Descramble / Decode

  9. Results

  10. Results • Router Limitation • None Invasive • Character Limitation

  11. Conclusion • Hector Codes allows for yet another use for SoNIC. • Hard to detect hidden message. • Allows for greater network efficiency.

  12. LessonsLearned • C Language • Whiteboard • LaTeX • Terminal

  13. Acknowledgements • Hakim Weatherspoon • KiSuh Lee • Han Wang • LSAMP • TRUST • Cornell University

  14. Contact information • Héctor A. Tosado Jimenez • hector.tosado@upr.edu • Professor Hakim Weatherspoon • hweather@cs.cornell.edu • KiSuh Lee • kslee@cs.cornell.edu • Han Wang • hwang@cs.cornell.edu

  15. Questions

More Related