With the advent of big data, modern businesses face an increasing need to store and process large volumes of sensitive customer information on the cloud. In these environments, resources are shared across a multitude of mutually untrusting tenants increasing propensity for data leakage. With the recent spate of high-profile data exfiltration attacks and the emergence of critical vulnerabilities such as Heartbleed and Shellshock, coupled with increasing use of clouds in all aspects of our daily lives, this problem stands to grow further in severity. In this thesis, we present a novel network-based covert channel that can arise in the context of shared network resources in data-center environments even in the presence of network monitors r...
Indirect communication channels have been effectively employed in the communications world to bypass...
We present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channe...
Virtual Private Networks (VPNs) are increasingly used to build logically isolated networks. However,...
With the advent of big data, modern businesses face an increasing need to store and process large vo...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Recent exploration into the unique security challenges of cloud computing have shown that when virtu...
Covert channel is secret communication path, which existence is not expected in original system of d...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
Indirect communication channels have been effectively employed in the communications world to bypass...
We present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channe...
Virtual Private Networks (VPNs) are increasingly used to build logically isolated networks. However,...
With the advent of big data, modern businesses face an increasing need to store and process large vo...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Recent exploration into the unique security challenges of cloud computing have shown that when virtu...
Covert channel is secret communication path, which existence is not expected in original system of d...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
Indirect communication channels have been effectively employed in the communications world to bypass...
We present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channe...
Virtual Private Networks (VPNs) are increasingly used to build logically isolated networks. However,...