Rearranging Inv Message in the Bitcoin to Construct Covert Channels

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1897))

Included in the following conference series:

  • 231 Accesses

Abstract

Covert channels aim to conceal the communication behaviors and are widely applied to transmit sensitive data. Blockchains are well-suited for building state-of-the-art covert channels due to their decentralization property. Most existing blockchain-based covert channels require the sender to create transactions. Creating transactions requires a fee, and transactions with covert information are permanently stored on the blockchain. Implementing such methods needs a high cost, and the on-chain covert information faces the risk of being exposed. In this paper, we first propose a Bitcoin-based covert channel that rearranges the transaction hashes in Bitcoin inv packets. To improve undetectability and transmission efficiency, we further propose a dynamic channel link scheme and a method for establishing channels with multiple receiving nodes. The dynamic channel link scheme provides the ability to change the connection between the sender and the receiver at any moment. The multiple receiving nodes method linearly increases the transmission efficiency according to the number of nodes. Theoretical and experimental analysis shows that our scheme is undetectable and has higher transmission efficiency than existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 64.19
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 80.24
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Transaction fees in bitcoin. https://bitinfocharts.com/zh/comparison/bitcoin-transactionfees.html/. Accessed 2 Feb 2023

  2. Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin: powering next-generation botnets with bitcoin. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 34–48. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48051-9_3

    Chapter  Google Scholar 

  3. Bartoletti, M., Pompianu, L.: An analysis of bitcoin OP_RETURN metadata. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 218–230. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_14

    Chapter  Google Scholar 

  4. Basuki, A.I., Rosiyadi, D.: Joint transaction-image steganography for high capacity covert communication. In: 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 41–46. IEEE (2019)

    Google Scholar 

  5. Fionov, A.: Exploring covert channels in bitcoin transactions. In: 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), pp. 0059–0064. IEEE (2019)

    Google Scholar 

  6. Franzoni, F., Abellan, I., Daza, V.: Leveraging bitcoin testnet for bidirectional botnet command and control systems. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 3–19. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_1

    Chapter  Google Scholar 

  7. Frkat, D., Annessi, R., Zseby, T.: ChainChannels: private botnet communication over public blockchains. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1244–1252. IEEE (2018)

    Google Scholar 

  8. Gianvecchio, S., Wang, H.: An entropy-based approach to detecting covert timing channels. IEEE Trans. Dependable Secure Comput. 8(6), 785–797 (2010)

    Article  Google Scholar 

  9. Hartl, A., Annessi, R., Zseby, T.: A subliminal channel in EdDSA: information leakage with high-speed signatures. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 67–78 (2017)

    Google Scholar 

  10. Liu, S., et al.: Whispers on ethereum: blockchain-based covert data embedding schemes. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 171–179 (2020)

    Google Scholar 

  11. Llamas, D., Allison, C., Miller, A.: Covert channels in internet protocols: a survey. In: Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET, vol. 2005 (2005)

    Google Scholar 

  12. Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin, vol. 4, p. 2 (2008). https://bitcoin.org/bitcoin.pdf

  13. Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3), 18 (2018)

    Article  Google Scholar 

  14. Sleiman, M.D., Lauf, A.P., Yampolskiy, R.: Bitcoin message: data insertion on a proof-of-work cryptocurrency system. In: 2015 International Conference on Cyberworlds (CW), pp. 332–336. IEEE (2015)

    Google Scholar 

  15. Tian, J., **ong, G., Li, Z., Gou, G.: A survey of key technologies for constructing network covert channel. Secur. Commun. Netw. 2020, 1–20 (2020)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Key Research and Development Program of China (Grant No. 2020YFB1006100) and the National Natural Science Foundation of China (Grant No. 62232002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liehuang Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Q., Chen, Z., Gao, F., Zhu, L. (2024). Rearranging Inv Message in the Bitcoin to Construct Covert Channels. In: Chen, J., Wen, B., Chen, T. (eds) Blockchain and Trustworthy Systems. BlockSys 2023. Communications in Computer and Information Science, vol 1897. Springer, Singapore. https://doi.org/10.1007/978-981-99-8104-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-8104-5_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-8103-8

  • Online ISBN: 978-981-99-8104-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation