The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using resources that are traditionally unintended for data transmission. In a covert channel, only the sender and receiver are aware of the communication and capable of reading the transmitted message, and any other party would not be aware of the existence of this transmission. The timing channel has been studied as a medium for covert communication in a computer network. It offers the means to communicate a message by relaying information encrypted within the timings formed between consecutive packets. This thesis covers two schemes that utilize the timing channel for covert communication -- to send a message and to trace network flows. The ...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
A covert channel is a communication method that misuses legitimate resources to bypass intrusion det...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
A covert timing channel is method that utilize to bypass security rules and transfer illegal data a...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
This dissertation focuses on covert communication in channels where the communication takes place by...
Covert timing channels are an important alternative for transmitting information in the world of the...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
Today’s world of data communication and networks has become, and will continue to be, an inevitable ...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
A covert channel is a communication method that misuses legitimate resources to bypass intrusion det...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
A covert timing channel is method that utilize to bypass security rules and transfer illegal data a...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
This dissertation focuses on covert communication in channels where the communication takes place by...
Covert timing channels are an important alternative for transmitting information in the world of the...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
Today’s world of data communication and networks has become, and will continue to be, an inevitable ...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
A covert channel is a communication method that misuses legitimate resources to bypass intrusion det...