Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems i.e. mainframes. More recently focus has shifted towards covert channels in computer network protocols. The huge amount of data and vast number of different protocols in the Internet seems ideal as a high-bandwidth vehicle for covert communication. This article is a survey of the existing techniques for creating covert channels in widely deployed network and application protocols. We also give an overview of common methods for their de...
Covert channel techniques are used by attackers to transfer hidden data. There are two main categori...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Since the dawn of human communications, there have been people that have wished to correspond secret...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Covert Channels have existed for more than twenty years now. Although they did not receive a special...
Covert Channels have existed for more than twenty years now. Although they did not receive a special...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Covert channel techniques are used by attackers to transfer hidden data. There are two main categori...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Since the dawn of human communications, there have been people that have wished to correspond secret...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Covert Channels have existed for more than twenty years now. Although they did not receive a special...
Covert Channels have existed for more than twenty years now. Although they did not receive a special...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Covert channel techniques are used by attackers to transfer hidden data. There are two main categori...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...