A novel covert channel based on the IP header record route option
International Journal of Advanced Media and Communication
ACM Transactions on Information and System Security (TISSEC)
Covert channels in ad-hoc wireless networks
Ad Hoc Networks
Embedding a covert channel in active network connections
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Hide and seek in time: robust covert timing channels
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A secure distributed operating system
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Evaluating the transmission rate of covert timing channels in a network
Computer Networks: The International Journal of Computer and Telecommunications Networking
CoCo: coding-based covert timing channels for network flows
IH'11 Proceedings of the 13th international conference on Information hiding
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
An asynchronous covert channel using spam
Computers & Mathematics with Applications
What are suspicious VoIP delays?
Multimedia Tools and Applications
Traceroute based IP channel for sending hidden short messages
IWSEC'06 Proceedings of the 1st international conference on Security
Babel: a secure computer is a polyglot
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Systematic engineering of control protocols for covert channels
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Analysis of the communication between colluding applications on modern smartphones
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
An information transfer path that allows information to be transferred in a manner that violates the security policy of a trusted network is called a covert channel.