Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Con-stellation because we hide the covert messages within a “dirty ” constellation that mimics noise commonly imposed by hardware imperfections and channel condi-tions. The cover traffic in this method is the baseband modulation constellation. We leverage the variability in the wireless channel and hardware conditions to encode the covert channel. Packet sharing techniques and pre-distortion of the modulated symbols of a decoy packet allows the transmission of a secondary covert message while making it statistically undetec...
Covert systems are designed to operate at a low probability of detection (LPD) in order to provide s...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
This paper presents the design and implementation of spyware communication circuits built into the w...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
People sometimes need to communicate directly with one another while concealing the communication it...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
A covert communication system under block fading channels is considered, where users experience unc...
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The proliferation of Internet of Things has propelled the popularization of IEEE 802.15.4 standard. ...
Covert systems are designed to operate at a low probability of detection (LPD) in order to provide s...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
This paper presents the design and implementation of spyware communication circuits built into the w...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
People sometimes need to communicate directly with one another while concealing the communication it...
Covert communications hide the transmission of a message from a watchful adversary while ensuring a ...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
A covert communication system under block fading channels is considered, where users experience unc...
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The proliferation of Internet of Things has propelled the popularization of IEEE 802.15.4 standard. ...
Covert systems are designed to operate at a low probability of detection (LPD) in order to provide s...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
This paper presents the design and implementation of spyware communication circuits built into the w...