With the advent of big data, modern businesses face an increasing need to store and process large volumes of sensitive customer information on the cloud. In these environments, resources are shared across a multitude of mutually untrusting tenants increasing propensity for data leakage. With the recent spate of high-profile data exfiltration attacks and the emergence of critical vulnerabilities such as Heartbleed and Shellshock, coupled with increasing use of clouds in all aspects of our daily lives, this problem stands to grow further in severity. In this thesis, we present a novel network-based covert channel that can arise in the context of shared network resources in data-center environments even in the presence of network monitors r...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Recent exploration into the unique security challenges of cloud computing have shown that when virtu...
Side channels are channels of implicit information flow that can be used to find out information tha...
With the advent of big data, modern businesses face an increasing need to store and process large vo...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be expl...
Information leaks are a top concern to industry and government leaders. The IoT is a technology capa...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Cyber-attacks are causing losses amounted to billions of dollars every year due to data breaches and...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Recent exploration into the unique security challenges of cloud computing have shown that when virtu...
Side channels are channels of implicit information flow that can be used to find out information tha...
With the advent of big data, modern businesses face an increasing need to store and process large vo...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be expl...
Information leaks are a top concern to industry and government leaders. The IoT is a technology capa...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Cyber-attacks are causing losses amounted to billions of dollars every year due to data breaches and...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Recent exploration into the unique security challenges of cloud computing have shown that when virtu...
Side channels are channels of implicit information flow that can be used to find out information tha...