Abstract — The detection of covert channels has quickly become a vital need due to their pervasive nature and the increasing popularity of the Internet. In recent years, new and innovative methods have been proposed to aid in the detection of covert channels. Existing detection schemes are often too specific and are ineffective against new covert channels. In this paper, we expound upon previous work done with timing channels and apply it to detecting covert storage channels. Our approach is based on the assumption that the entropy of covert channels will vary from that of previously observed, legitimate, communications. This change in the entropy of a process provides us with a method for identifying storage channels. Using this assumption...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Since the dawn of human communications, there have been people that have wished to correspond secret...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-...
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-...
covert timing channel is based on modulation of the timing information in the network packets in a s...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Chan...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Since the dawn of human communications, there have been people that have wished to correspond secret...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-...
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-...
covert timing channel is based on modulation of the timing information in the network packets in a s...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Chan...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Since the dawn of human communications, there have been people that have wished to correspond secret...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...