Covert channels are becoming more popular as security risks grow in networks. One area that is promising for covert channels is wireless networks, since many use a collision avoidance scheme such as carrier sense multiple access with collision avoidance (CSMA/CA). These schemes often introduce randomness in the network, which provides good cover for a covert timing channel. In this thesis, we use the 802.11 standard as an example to demonstrate a wireless covert channel. In particular, most 802.11 configurations use a distributed coordinated function (DCF) to assist in communications. This DCF uses a random backoff to avoid collisions, which provides the cover for our covert channel. Our timing channel provides great improvements on o...
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
Covert channels are becoming more popular as security risks grow in networks. One area that is prom...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
AbstractThe paper presents a novel technique to detect Denial of Service (DoS) attacks applied by mi...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Covert systems are designed to operate at a low probability of detection (LPD) in order to provide s...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
This paper presents the design and implementation of spyware communication circuits built into the w...
A covert timing channel is method that utilize to bypass security rules and transfer illegal data a...
This paper presents ZigZag, an 802.11 receiver design that combats hidden terminals. ZigZag's core c...
Information leaks are a top concern to industry and government leaders. The IoT is a technology capa...
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
Covert channels are becoming more popular as security risks grow in networks. One area that is prom...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
AbstractThe paper presents a novel technique to detect Denial of Service (DoS) attacks applied by mi...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Covert systems are designed to operate at a low probability of detection (LPD) in order to provide s...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
This paper presents the design and implementation of spyware communication circuits built into the w...
A covert timing channel is method that utilize to bypass security rules and transfer illegal data a...
This paper presents ZigZag, an 802.11 receiver design that combats hidden terminals. ZigZag's core c...
Information leaks are a top concern to industry and government leaders. The IoT is a technology capa...
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...