A survey of covert channels and countermeasures in computer network protocols

S Zander, G Armitage, P Branch - … Communications Surveys & …, 2007 - ieeexplore.ieee.org
Covert channels are used for the secret transfer of information. Encryption only protects
communication from being decoded by unauthorised parties, whereas covert channels aim …

A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Steganography of VoIP streams

W Mazurczyk, K Szczypiorski - On the Move to Meaningful Internet …, 2008 - Springer
The paper concerns available steganographic techniques that can be used for creating
covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing …

[HTML][HTML] Using transcoding for hidden communication in IP telephony

W Mazurczyk, P Szaga, K Szczypiorski - Multimedia Tools and …, 2014 - Springer
The paper presents a new steganographic method for IP telephony called TranSteg (Tran
scoding Steg anography). Typically, in steganographic communication it is advised for …

VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

[HTML][HTML] Covert channels in TCP/IP protocol stack-extended version

A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have
institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …

网络隐蔽信道关键技术研究综述

李彦峰, 丁丽萍, 吴敬征, 崔强, 刘雪花, 关贝, 王永吉 - 软件学报, 2019 - jos.org.cn
网络隐蔽信道是在网络环境下违反通信限制规则进行隐蔽信息传输的信息通道,
为网络信息安全带来了新的挑战, 也为数据传输的安全性和隐私性带来了新的研究方向 …

Covert Channels in SIP for VoIP signalling

W Mazurczyk, K Szczypiorski - … , ICGeS 2008, London, UK, June 23-25 …, 2008 - Springer
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation
Protocol) that can be used for creating covert channels during signaling phase of VoIP …

Covert channel attacks in pervasive computing

N Tuptuk, S Hailes - 2015 IEEE international conference on …, 2015 - ieeexplore.ieee.org
Ensuring security in pervasive computing systems is an essential pre-requisite for their
deployment. Typically, such systems are reliant on wireless networks for communication; …