[[abstract]]Covert channels are illicit means of leaking sensitive or private information through system global variables that usually are not part of the interpretation of data objects in the security model. We discovered that some covert channels can be modeled as finite-state graphs while others cannot. By using various techniques given in the paper, multiple bits of information can be simultaneously transferred through single or multiple covert channels. We present methods to determine and estimate the maximum bandwidths of both finite-state and infinite-state channels, and give the problems and basic rules for their measurement.[[fileno]]2030208010024[[department]]資訊工程學
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Part 3: INFRASTRUCTURE SECURITYInternational audienceDespite extensive research, covert channels are...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Covert channel is secret communication path, which existence is not expected in original system of d...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Part 3: INFRASTRUCTURE SECURITYInternational audienceDespite extensive research, covert channels are...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Abstract. We present a formal model for analyzing the bandwidth of covert channels. The focus is on ...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Covert channel is secret communication path, which existence is not expected in original system of d...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Part 3: INFRASTRUCTURE SECURITYInternational audienceDespite extensive research, covert channels are...