FINDING · DEFENSE
Observation-based FTE constructs each packet field exclusively from values previously observed in real host-protocol traffic, guaranteeing syntactic equivalence. Wireshark correctly decodes Protocol Proxy-generated packets as valid Synchrophasor frames with correct checksums, and the Phasor Data Concentrator hardware accepts them; any rule blocking Protocol Proxy traffic must therefore also block legitimate PMU packets.
From 2020-oakley-protocol — Protocol Proxy: An FTE-based covert channel · §5.1, §7 · 2020 · Computers \& Security
Implications
- Implement FTE by building a lookup table of empirically observed field values rather than a PCFG grammar; this avoids the open research question of grammar derivation while guaranteeing all emitted values are indistinguishable from real traffic.
- Validate syntactic equivalence with a protocol-aware parser (e.g., Wireshark dissector) before deployment — a failed parse is a detectable fingerprint even when payload entropy looks correct.
Tags
Extracted by claude-sonnet-4-6 — review before relying.