Covert channel

Results: 66



#Item
1

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

Add to Reading List

Source URL: gray-world.net

Language: English - Date: 2010-06-12 03:14:41
    2

    20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

    Add to Reading List

    Source URL: jonmillen.com

    Language: English - Date: 2017-01-20 09:51:59
      3

      How to cook a covert channel Techniques Simon Castro and Gray World Team Difficulty

      Add to Reading List

      Source URL: gray-world.net

      Language: English - Date: 2010-06-12 03:14:41
        4

        Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

        Add to Reading List

        Source URL: rayb.info

        - Date: 2016-08-19 22:20:15
          5Computer memory / Computing / Covert channel / Dynamic random-access memory / Random-access memory / Digital media

          Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

          Add to Reading List

          Source URL: www.iaik.tugraz.at

          Language: English - Date: 2015-11-30 11:00:03
          6Information theory / Probability / Interference / Elevator / Covert channel / Information flow / Electronics / Measurement / Applied mathematics

          ICS 355: Introduction Dusko Pavlovic Covert Security and Trust I:

          Add to Reading List

          Source URL: www.asecolab.org

          Language: English - Date: 2014-12-01 15:45:46
          7Computing / Physics / Electromagnetism / Noise / Information theory / Cloud clients / Personal computing / State functions / Android / Channel / Laptop / ShannonHartley theorem

          On the Capacity of Thermal Covert Channels in Multicores Davide B. Bartolini Philipp Miedl Lothar Thiele

          Add to Reading List

          Source URL: www.tik.ee.ethz.ch

          Language: English - Date: 2016-04-15 07:21:50
          8Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

          IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

          Add to Reading List

          Source URL: coleman.ucsd.edu

          Language: English
          9Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

          64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

          Add to Reading List

          Source URL: coleman.ucsd.edu

          Language: English
          10Media access control / Covert channel / Steganography / Information theory / Carrier sense multiple access / ALOHAnet / Channel / Network packet

          Covert Channels in Multiple Access Protocols Seyed Ali Ahmadzadeh Gordon B. Agnew University of Waterloo, Canada

          Add to Reading List

          Source URL: conferences.sigcomm.org

          Language: English - Date: 2011-08-01 22:51:56
          UPDATE