H Li,
T Song,
Y Yang - IEEE Transactions on Dependable and …, 2022 - ieeexplore.ieee.org
Network covert timing channels can be maliciously used to exfiltrate secrets, coordinate
attacks and propagate malwares, posing serious threats to cybersecurity. Current covert …