A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Research on a covert communication model realized by using smart contracts in blockchain environment

L Zhang, Z Zhang, W Wang, Z Jin, Y Su… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The traditional covert communication channel relying on a third-party node is vulnerable to
attack. The data are easily tampered with and the identity information of the communication …

A comprehensive study of deep learning-based covert communication

A Anand, A Kumar Singh - ACM Transactions on Multimedia Computing …, 2022 - dl.acm.org
Deep learning-based methods have been popular in multimedia analysis tasks, including
classification, detection, segmentation, and so on. In addition to conventional applications …

20 years of covert channel modeling and analysis

J Millen - Proceedings of the 1999 IEEE Symposium on …, 1999 - ieeexplore.ieee.org
Covert channels emerged in mystery and departed in confusion. Covert channels are a
means of communication between two processes that are not permitted to communicate, but …

MRCC: a practical covert channel over Monero with provable security

Z Guo, L Shi, M Xu, H Yin - IEEE access, 2021 - ieeexplore.ieee.org
Covert channels are designed to protect the communication relationship of the sender and
receiver. Traditional covert channels have become insecure due to the continuous …

A more cautious approach to security against mass surveillance

JP Degabriele, P Farshim, B Poettering - Fast Software Encryption: 22nd …, 2015 - Springer
Abstract At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal
treatment of symmetric encryption in the light of algorithm substitution attacks (ASAs), which …

A survey of key technologies for constructing network covert channel

J Tian, G Xiong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …

Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

A new approach to covert communication via PDF files

IS Lee, WH Tsai - Signal processing, 2010 - Elsevier
A new covert communication method via PDF files is proposed. A secret message, after
being encoded by a special ASCII code and embedded at between-word and between …

The pump: A decade of covert fun

MH Kang, IS Moskowitz… - 21st Annual Computer …, 2005 - ieeexplore.ieee.org
This paper traces the ten plus year history of the Naval Research Laboratory's Pump idea.
The Pump was theorized, designed, and built at the Naval Research Laboratory's Center for …