Sciweavers

TDHMS
2008

Oracle Channels

13 years 10 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name oracle channels. By exploiting information-theoretic notions, we show how to modify detection/authentication watermarking algorithms in order to counteract oracle attacks. We present three proposals, one based on randomization, another one based on time delay and a third one based on both randomization and delay.
Ilaria Venturini
Added 28 Jan 2011
Updated 28 Jan 2011
Type Journal
Year 2008
Where TDHMS
Authors Ilaria Venturini
Comments (0)