150 likes | 307 Views
SoNIC Steganography. Presenter: Hector Tosado Advisor: Professor Hakim Weatherspoon Cornell University TRUST REU Program. Introduction.
E N D
SoNICSteganography Presenter: Hector Tosado Advisor: Professor Hakim Weatherspoon Cornell University TRUST REU Program
Introduction • Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. • 1’s and 0’s
Agenda • Introduction • SoNICSteganography • Network Stack • SoNIC • Hector Codes • Results • Conclusion • Acknowledgements
Network Stack • Open Systems Interconnection Model (OSI) • PHY Layer – Generate and detect signals for transmit
SoNIC • SoNIC (Software Network Interface Card). • Software – What is sent • Hardware – How it’s sent • Real-Time
10G Ethernet Hector Codes • 6 bit representation of each letter and symbol • 100 0000 - @ – 00 0000 - A • 100 1111 - O – 00 1111 - P
Hector Codes • Encode / Scramble • Descramble / Decode
Results • Router Limitation • None Invasive • Character Limitation
Conclusion • Hector Codes allows for yet another use for SoNIC. • Hard to detect hidden message. • Allows for greater network efficiency.
LessonsLearned • C Language • Whiteboard • LaTeX • Terminal
Acknowledgements • Hakim Weatherspoon • KiSuh Lee • Han Wang • LSAMP • TRUST • Cornell University
Contact information • Héctor A. Tosado Jimenez • hector.tosado@upr.edu • Professor Hakim Weatherspoon • hweather@cs.cornell.edu • KiSuh Lee • kslee@cs.cornell.edu • Han Wang • hwang@cs.cornell.edu