Covert channel

Results: 66



#Item
11

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

Add to Reading List

Source URL: www.cs.wm.edu

Language: English - Date: 2012-08-20 22:24:04
    12Software / System software / Computer architecture / Virtual memory / Memory management / Data compression / Data deduplication / Data management / Kernel same-page merging / X86-64 / Covert channel / Kernel

    Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

    Add to Reading List

    Source URL: www.cs.wm.edu

    Language: English - Date: 2013-05-30 14:58:15
    13Domain name system / Internet / Computing / Network architecture / DNS hijacking / Extension mechanisms for DNS / Covert channel / CNAME record / Name server

    On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Laboratoire d’Informatique de Grenoble / INRIA Lucas Nussbaum, Pierre Neyron and Olivier Richard On Robust Covert Channels Inside D

    Add to Reading List

    Source URL: www.loria.fr

    Language: English - Date: 2011-10-12 09:35:39
    14

    Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

    Add to Reading List

    Source URL: www.ists.dartmouth.edu

    Language: English - Date: 2008-09-11 13:38:43
      15

      Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

      Add to Reading List

      Source URL: www.usenix.org

      Language: English
        16Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

        A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:41:06
        17Computing / Network performance / Computer network security / Computer security / Internet privacy / Transmission Control Protocol / Packet loss / Proxy server / Deep packet inspection / Voice over IP / Traffic shaping / Firewall

        Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2013-09-04 16:00:20
        18Functional programming / Programming idioms / Inter-process communication / Software design patterns / Parallel computing / Monad / Concurrent Haskell / Information flow / Covert channel / Concurrent computing / LIO / Recursion

        Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

        Add to Reading List

        Source URL: amitlevy.com

        Language: English - Date: 2012-10-19 15:09:55
        19

        The b2/c3 problem: How big buffers overcome covert channel cynicism in trusted database systems J. McDermott Naval Research Laboratory, Code 5542, Washington, DC 23075, USA Abstract We present a mechanism for communicati

        Add to Reading List

        Source URL: www.gray-world.net

        Language: English - Date: 2010-06-12 03:14:41
          20

          Covert Channel Analysis and Data Hiding in TCP/IP by Kamran Ahsan

          Add to Reading List

          Source URL: www.gray-world.net

          Language: English - Date: 2010-06-12 03:14:41
            UPDATE