A pump for rapid, reliable, secure communication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Integrating Security and Real-Time Requirements Using Covert Channel Capacity
IEEE Transactions on Knowledge and Data Engineering
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Formal Aspects in Security and Trust
An analysis of the timed Z-channel
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
A trust-based noise injection strategy for privacy protection in cloud
Software—Practice & Experience
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Whispers in the hyper-space: high-speed covert channel attacks in the cloud
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Hi-index | 0.01 |
We explore two approaches to introducing noise intothe bus-contention channel: an existing approach calledfuzzy time, and a novel approach called probabilistic partitioning. We compare the two approaches in terms of the impact on covert channel capacity, the impact onperformance, the amount of random data needed, andtheir suitability for various applications. For probabilisticpartitioning, we obtain a precise tradeoff betweencovert channel capacity and performance.