Covert channel

Results: 66



#Item
41Computer network security / Time to live / Overt channel / Firewall / Channel / Packet loss / Data transmission / Cyberwarfare / Computing / Covert channel / Steganography

An Empirical Evaluation of IP Time To Live Covert Channels Sebastian Zander, Grenville Armitage, Philip Branch {szander,garmitage,pbranch}@swin.edu.au http://caia.swin.edu.au/cv/pbranch

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2010-09-09 01:11:41
42Open / Computing / Software engineering / Software / Covert channel / Steganography / Memory leak

A Note on the Confinement Problem1 Butler W. Lampson Xerox Palo Alto Research Center This note explores the problem of confining a program during its execution so that it cannot transmit information to any other program

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2004-08-31 08:18:48
43Steganography / Security / Digital photography / Digital watermarking / Watermark / Covert channel / Fingerprint / Microdot / Audio watermark detection / Cryptography / Watermarking / Espionage

1062 Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062–1078, July[removed]Information Hiding—A Survey Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-27 09:48:04
44IOS / Multi-touch / Digital video recorder / Universal Serial Bus / IPad / IPod / USB flash drive / IPhone / Hard disk drive / Computer hardware / ITunes / Apple Inc.

simply unique. H.264 Multi-Channel Covert Digital Video Recorder with Built-In Monitor

Add to Reading List

Source URL: www.surveillance-video.com

Language: English - Date: 2014-02-21 12:38:04
45Advanced persistent threat / Splunk / Compass / Covert channel / Hacker / Computing / Computer security / Hacking

02_APT_Detection_with_Splunk_V2 1 [Read-Only]

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:47
46Espionage / Cryptographic software / Steven Murdoch / Year of birth missing / Tor / Covert channel / Traffic analysis / Steganography / Internet protocol suite / Cryptography / Internet privacy / Computing

Covert channel vulnerabilities in anonymity systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-12-14 07:19:29
47Communication / Fraunhofer Society / Covert channel / Computer security / Technology / Cyberwarfare / Building automation / Security / BACnet

A Cost-efficient Building Automation Security Testbed for Educational Purposes Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk and Steffen Wendzel Cyber Security Department Fraunhofer Institute for Communication, In

Add to Reading List

Source URL: www.iaria.org

Language: English - Date: 2015-01-08 13:14:48
48Streaming / Telecommunications engineering / Security / Electronic engineering / Covert channel / Steganography / Quality of service / Actor model / Throughput / Network performance / Teletraffic / Computing

A Formal Approach to the Integrated Analysis of Security and QoS Alessandro Aldini ∗ , Marco Bernardo Universit` a di Urbino “Carlo Bo” Istituto di Scienze e Tecnologie dell’Informazione

Add to Reading List

Source URL: www.sti.uniurb.it

Language: English - Date: 2006-07-12 04:52:38
49Computer networking / Covert channel / Steganography / Keystroke logging / Channel / Transmission Control Protocol / Timing attack / Jitter / Overt channel / Computing / Espionage / Electronics

Keyboards and Covert Channels Gaurav Shah, Andres Molina and Matt Blaze Department of Computer and Information Science University of Pennsylvania {gauravsh, andresmf, blaze}@cis.upenn.edu

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2006-08-07 14:09:37
50Crime prevention / National security / Information flow / Information theory / Information security / Covert channel / Bell–LaPadula model / Security policy / Mandatory access control / Computer security / Security / Cyberwarfare

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY[removed]Language-Based Information-Flow Security Andrei Sabelfeld and Andrew C. Myers

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-11-25 05:03:09
UPDATE