This paper presents a covert communication channel that exists in virtually all forms of packet switching data networks. On the one hand, this covert channel, if used properly, can potentially enhance the overall security of data communications over networks. On the other hand, the covert channel can also potentially become a back door to access a destination computer, and hence becomes a security hazard to the computer. A simple protocol is specified for communications on the covert channel. A modified TFTP application is also presented to demonstrate how to use the covert channel to convey secret messages or to enhance the integrity of data communications. The application also illustrates a back door that leaks client’s data files without...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...
A new covert channel over the RTP protocol is designed and implemented by modifying the timestamp va...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Covert channels are used as a means of secretly transferring information when there is a need to hid...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Covert channel techniques are used by attackers to transfer hidden data. There are two main categori...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...
A new covert channel over the RTP protocol is designed and implemented by modifying the timestamp va...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Covert channels are used as a means of secretly transferring information when there is a need to hid...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Covert channel techniques are used by attackers to transfer hidden data. There are two main categori...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...
A new covert channel over the RTP protocol is designed and implemented by modifying the timestamp va...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...