<--- Back to Details
First PageDocument Content
Domain name system / Internet / Computing / Network architecture / DNS hijacking / Extension mechanisms for DNS / Covert channel / CNAME record / Name server
Date: 2011-10-12 09:35:39
Domain name system
Internet
Computing
Network architecture
DNS hijacking
Extension mechanisms for DNS
Covert channel
CNAME record
Name server

On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Laboratoire d’Informatique de Grenoble / INRIA Lucas Nussbaum, Pierre Neyron and Olivier Richard On Robust Covert Channels Inside D

Add to Reading List

Source URL: www.loria.fr

Download Document from Source Website

File Size: 225,99 KB

Share Document on Facebook

Similar Documents

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

DocID: 1uota - View Document

20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025

DocID: 1u9SC - View Document

How to cook a covert channel Techniques Simon Castro and Gray World Team  Difficulty

How to cook a covert channel Techniques Simon Castro and Gray World Team Difficulty

DocID: 1u2Yd - View Document

Sixth Annual Conference on Privacy, Security and Trust  A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

DocID: 1sdoX - View Document

Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1rdk7 - View Document