This paper explores the potential of executables for covert communication. Three techniques for the embedding of secret information are presented. Possible attacks on the stealthiness of these techniques are identified and countered. The presented concepts are implemented and evaluated for the IA-32 architecture, for which we obtain an encoding rate of 1/27 before countermeasures and 1/89 after countermeasures.
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cov...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cove...
Covert channels through shared processor resources provide secret communication between malicious pr...
The purpose of the article was to analyze technique to prevent information leakage using covert chan...
SummaryDenial of service (DoS) attack is an attempt of the attacker to disable victim's machine by d...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
AbstractWith the ability to leak confidential information in a secret manner, covert channels pose a ...
Information hiding techniques have been recently getting increased attention from the security commu...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
This paper presents a new behavior based covert channel utilizing the database update mechanism of a...
The rapid development of multimedia and internet allows for wide distribution of digital media data....
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cov...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cove...
Covert channels through shared processor resources provide secret communication between malicious pr...
The purpose of the article was to analyze technique to prevent information leakage using covert chan...
SummaryDenial of service (DoS) attack is an attempt of the attacker to disable victim's machine by d...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
AbstractWith the ability to leak confidential information in a secret manner, covert channels pose a ...
Information hiding techniques have been recently getting increased attention from the security commu...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
This paper presents a new behavior based covert channel utilizing the database update mechanism of a...
The rapid development of multimedia and internet allows for wide distribution of digital media data....
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...