A survey of covert channels and countermeasures in computer network protocols

S Zander, G Armitage, P Branch - … Communications Surveys & …, 2007 - ieeexplore.ieee.org
Covert channels are used for the secret transfer of information. Encryption only protects
communication from being decoded by unauthorised parties, whereas covert channels aim …

Pattern-based survey and categorization of network covert channel techniques

S Wendzel, S Zander, B Fechner, C Herdin - ACM Computing Surveys …, 2015 - dl.acm.org
Network covert channels are used to hide communication inside network protocols. Various
techniques for covert channels have arisen in the past few decades. We surveyed and …

[图书][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures

W Mazurczyk, S Wendzel, S Zander, A Houmansadr… - 2016 - books.google.com
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …

[PDF][PDF] Keyboards and Covert Channels.

G Shah, A Molina, M Blaze - USENIX Security Symposium, 2006 - usenix.org
This paper introduces JitterBugs, a class of inline interception mechanisms that covertly
transmit data by perturbing the timing of input events likely to affect externally observable …

Machine learning for detecting data exfiltration: A review

B Sabir, F Ullah, MA Babar, R Gaire - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software
Engineering (SE) has recently taken significant steps in proposing countermeasures for …

Detecting covert timing channels: an entropy-based approach

S Gianvecchio, H Wang - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
The detection of covert timing channels is of increasing interest in light of recent practice on
the exploitation of covert timing channels over the Internet. However, due to the high …

TCP/IP timing channels: Theory to implementation

SH Sellke, CC Wang, S Bagchi… - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
There has been significant recent interest in covert communication using timing channels. In
network timing channels, information is leaked by controlling the time between …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Model-based covert timing channels: Automated modeling and evasion

S Gianvecchio, H Wang, D Wijesekera… - Recent Advances in …, 2008 - Springer
The exploration of advanced covert timing channel design is important to understand and
defend against covert timing channels. In this paper, we introduce a new class of covert …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …