Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative actions. Covert channels aim to hide the very existence of the communication. The huge amount of data and vast number of different protocols in the Internet makes it ideal as a highbandwidth vehicle for covert communications. A number of researchers have proposed different techniques to encode covert information into the IP Time To Live (TTL) field. This is a noisy covert channel since the TTL field is modified between covert sender and receiver. For computing the channel capacity it is necessary to know the probability of channel errors. In this paper we derive analyti...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
International audienceIn covert communication, a transmitter attempts to send a message over a chann...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels aim to hide the existence of communication between two or more parties. Such channel...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
International audienceIn covert communication, a transmitter attempts to send a message over a chann...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels aim to hide the existence of communication between two or more parties. Such channel...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
Covert channels are mechanisms for communicating information in ways that are difficult to detect. D...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...