Covert

Results: 573



#Item
11Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

Add to Reading List

Source URL: gray-world.net

Language: English - Date: 2010-06-12 03:14:41
    12Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

    Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

    Add to Reading List

    Source URL: people.seas.harvard.edu

    Language: English - Date: 2016-06-13 14:12:31
      1320 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

      20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

      Add to Reading List

      Source URL: jonmillen.com

      Language: English - Date: 2017-01-20 09:51:59
        14How to cook a covert channel Techniques Simon Castro and Gray World Team  Difficulty

        How to cook a covert channel Techniques Simon Castro and Gray World Team Difficulty

        Add to Reading List

        Source URL: gray-world.net

        Language: English - Date: 2010-06-12 03:14:41
          15Covert Channels in the IP Time To Live TTL Field Sebastian Zander, Grenville Armitage, Philip Branch {szander,garmitage,pbranch}@swin.edu.au http://caia.swin.edu.au

          Covert Channels in the IP Time To Live TTL Field Sebastian Zander, Grenville Armitage, Philip Branch {szander,garmitage,pbranch}@swin.edu.au http://caia.swin.edu.au

          Add to Reading List

          Source URL: caia.swin.edu.au

          Language: English - Date: 2010-09-09 01:11:40
            16Constructing and Characterizing Covert Channels on GPGPUs Hoda Naghibijouybari Khaled N. Khasawneh  Nael Abu-Ghazaleh

            Constructing and Characterizing Covert Channels on GPGPUs Hoda Naghibijouybari Khaled N. Khasawneh Nael Abu-Ghazaleh

            Add to Reading List

            Source URL: www.cs.ucr.edu

            Language: English - Date: 2017-09-01 17:18:20
              17New Covert Channels in HTTP Adding Unwitting Web Browsers to Anonymity Sets Matthias Bauer Institut für Informatik MartensstrasseErlangen, Germany

              New Covert Channels in HTTP Adding Unwitting Web Browsers to Anonymity Sets Matthias Bauer Institut für Informatik MartensstrasseErlangen, Germany

              Add to Reading List

              Source URL: gray-world.net

              Language: English - Date: 2010-06-12 03:14:41
                18Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks Ting-Fang Yen Alina Oprea

                Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks Ting-Fang Yen Alina Oprea

                Add to Reading List

                Source URL: www.covert.io

                - Date: 2017-08-29 09:25:43
                  19Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud Cl´ementine Maurice∗ , Manuel Weber∗ , Michael Schwarz∗ , Lukas Giner∗ , Daniel Gruss∗† , Carlo Alberto Boano∗ , Kay R¨omer∗

                  Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud Cl´ementine Maurice∗ , Manuel Weber∗ , Michael Schwarz∗ , Lukas Giner∗ , Daniel Gruss∗† , Carlo Alberto Boano∗ , Kay R¨omer∗

                  Add to Reading List

                  Source URL: gruss.cc

                  - Date: 2017-01-09 05:00:56
                    20PSUDP: A Passive Approach to Network-Wide Covert Communication Kenton Born   Black Hat USA 2010

                    PSUDP: A Passive Approach to Network-Wide Covert Communication Kenton Born Black Hat USA 2010

                    Add to Reading List

                    Source URL: media.blackhat.com

                    - Date: 2012-04-07 14:53:10