Sciweavers

63 search results - page 4 / 13
» Detecting covert timing channels: an entropy-based approach
Sort
View
ACSAC
2002
IEEE
14 years 10 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
JSAC
2008
92views more  JSAC 2008»
13 years 7 months ago
Multiband OFDM for Covert Acoustic Communications
A multiband OFDM transmitter and receiver are presented for underwater communications at low SNR. Compared with a single-band OFDM scheme, the multiband approach leads to a conside...
Geert Leus, Paul A. van Walree
CCS
2004
ACM
14 years 23 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
GI
2008
Springer
13 years 8 months ago
Towards an automated detection of self-organizing behavior
Abstract: In this paper we present an entropy based method to analyze complex systems. Systems are treated as black boxes, which only expose information by some specified paramete...
Wolfgang Trumler, Mike Gerdes
CJ
2010
150views more  CJ 2010»
13 years 4 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...