Sciweavers

INFOCOM
2012
IEEE
12 years 1 months ago
Pssst, over here: Communicating without fixed infrastructure
—This paper discusses a way to communicate without relying on fixed infrastructure at some central hub. This can be useful for bootstrapping loosely connected peer-to-peer syste...
Tom Callahan, Mark Allman, Michael Rabinovich
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 2 months ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.
ISITA
2010
13 years 8 months ago
Directed information and the NRL Network Pump
The NRL Network Pump R , or Pump, is a standard for mitigating covert channels that arise in a multi-level secure (MLS) system when a high user (HU) sends acknowledgements to a low...
Siva K. Gorantla, Sachin Kadloor, Todd P. Coleman,...
CORR
2008
Springer
140views Education» more  CORR 2008»
13 years 9 months ago
Steganography of VoIP streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing exis...
Wojciech Mazurczyk, Krzysztof Szczypiorski
SP
2008
IEEE
13 years 10 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
FC
2006
Springer
119views Cryptology» more  FC 2006»
14 years 2 months ago
Auditable Privacy: On Tamper-Evident Mix Networks
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
Jong Youl Choi, Philippe Golle, Markus Jakobsson
WPES
2003
ACM
14 years 4 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...
ICICS
2004
Springer
14 years 4 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
ISW
2005
Springer
14 years 4 months ago
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
Zhenghong Wang, Ruby B. Lee
ACSAC
2006
IEEE
14 years 5 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee