A storage channel is a covert computer channel that allows one process to write to a storage location while another process reads from it, bypassing security restrictions. It can be used unscrupulously to undermine security, allowing hackers to extract or manipulate data. Secure operating systems can monitor potential activity on storage channels using pattern recognition tools.
A storage channel is a covert computer channel that allows one process to write to a storage location on your computer or network, while allowing another process to read storage location information from another process. Like a covert channel, a storage channel has the ability to transfer data between objects that would otherwise be segregated by security restrictions in the computer’s operating system. This provides an extra layer of programming flexibility, but, if used unscrupulously, covert channels can be used to undermine security on a system.
Imagine a filing channel as a bit like two children passing notes back and forth during class. According to the rules established by the operating system – the “teacher” of the class – children should not talk. By passing information to each other outside the view of the operating system, they establish an otherwise inadmissible line of communication.
A storage channel is a two-way connection. Then, while one process is writing information to the hard drive or other storage location on the computer, a second process accesses and reads the information from the same storage device. This constant flow of information gives programmers another method for exchanging data on a computer. However, it does provide a means to attack a system if the programmers are dishonest.
Since your computer’s operating system is unaware of information transmitted through a storage channel, it is entirely possible for a hacker to extract personal or sensitive data through this type of channel. Furthermore, a hacker could also manipulate data within the system in the same way. So, in theory, someone who undermines a system in this way could make do with an organization’s financial records and leave incorrect “dummy” information in its place.
Since it is a type of covert channel, the possibility of storage channel data transfer cannot be completely eliminated. However, secure operating systems can monitor potential activity on storage channels using pattern recognition tools to see if unusual activity on the system could be information moving along storage channels. Think of this as listening to two people in different cells communicate by knocking on walls; if you only hear a knock or two over a long period of time, it was likely a random act. However, if knocking on walls is heard both regularly and rhythmically, information is likely to be exchanged.
Protect your devices with Threat Protection by NordVPN