Economics at your fingertips  

Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels

Bilal Shebaro, Fernando Pérez-González and Jedidiah R. Crandall
Additional contact information
Bilal Shebaro: Department of Computer Science, University of New Mexico, Albuquerque, NM, USA
Fernando Pérez-González: Signal Theory and Communications Department, University of Vigo, Vigo, Pontevedra, Spain
Jedidiah R. Crandall: Department of Computer Science, University of New Mexico, Albuquerque, NM, USA

International Journal of Digital Crime and Forensics (IJDCF), 2013, vol. 5, issue 1, 54-69

Abstract: Timing inference channels are a well-studied area of computer security and privacy research, but they have not been widely applied in digital forensic applications. Timing signatures (for example, of movies) are not robust against variations in the machine, the encoder, the environment, and other factors that affect timing, and unfortunately such issues have limited many researchers from using timing inference channels for revealing hidden data, detecting machine behavior, or even forensic analysis. The authors develop a geometrical interpretation in a high dimensional space of timing signatures for movies as an example of pattern-like software. The results suggest that timing signatures can be made robust against different machines, different encoders, and other environmental conditions by exploiting geometrical structure in this space. This geometrical structure helps identify the behavior of running pattern-like software that is useful for identifying digital crimes, privacy invasion matters, and network behaviors. This paper is focused on a thought experiment: how much information can an unprivileged process learn by just running on a system and observing its own timing? Although installing administrative software is the most frequent approach for understanding system behavior and detecting running software, the results show that it is feasible that such goals could be still achieved without any administrative privileges.

Date: 2013
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link) ... 4018/jdcf.2013010104 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link:

Access Statistics for this article

More articles in International Journal of Digital Crime and Forensics (IJDCF) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

Page updated 2019-11-24
Handle: RePEc:igg:jdcf00:v:5:y:2013:i:1:p:54-69