Sciweavers

ICON
2007
IEEE
14 years 5 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
IFIP
2009
Springer
14 years 6 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe
INFOCOM
2009
IEEE
14 years 6 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer
ESORICS
2009
Springer
14 years 6 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...