Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative actions. Covert channels aim to side-step this problem by hiding additional information within the 'normal' behaviour of preexisting communication streams. The huge amount of data and vast number of different protocols in the Internet make it ideal as a high-bandwidth vehicle for covert channels. Several researchers have proposed modulation techniques to encode covert information into the IP Time To Live field. In this paper we compare the different encoding techniques and also propose two new improved encoding schemes. We present a software framework developed for eval...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are used as a means of secretly transferring information when there is a need to hid...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Covert channels are used for the secret transfer of information. Unlike encryption, which only prote...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Communication is not necessarily made secure by the use of encryption alone. The mere existence of c...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Covert channels are used as a means of secretly transferring information when there is a need to hid...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...