The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
AbstractThis is Part I in a two-part series discussing the development of investigative support for ...
The keys which are generated by cryptography algorithms have still been compromised by attackers. So...
AbstractWith the ability to leak confidential information in a secret manner, covert channels pose a ...
AbstractThis is Part I in a two-part series discussing the development of investigative support for ...
IEEE Comp Soc, Task Force Informat Assurance, IEEE Informat Assurance Activit, IEEE Mass Storage...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
AbstractThis is Part I in a two-part series discussing the development of investigative support for ...
The keys which are generated by cryptography algorithms have still been compromised by attackers. So...
AbstractWith the ability to leak confidential information in a secret manner, covert channels pose a ...
AbstractThis is Part I in a two-part series discussing the development of investigative support for ...
IEEE Comp Soc, Task Force Informat Assurance, IEEE Informat Assurance Activit, IEEE Mass Storage...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...