Part 3: INFRASTRUCTURE SECURITYInternational audienceDespite extensive research, covert channels are a principal threat to information security. Covert channels employ specially-crafted content or timing characteristics to transmit internal information to external attackers. Most techniques for detecting covert channels model legitimate network traffic. However, such an approach may not be applicable in dynamic virtualized environments because traffic for modeling normal activities may not be available.This paper describes Observer, a real-time covert channel detection system. The system runs a secure virtual machine that mimics the vulnerable virtual machine so that any differences between two virtual machines can be identified in real tim...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Part 5: NETWORK FORENSICSInternational audienceDespite extensive research on malware and Trojan hors...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
Since the dawn of human communications, there have been people that have wished to correspond secret...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
Computer network is unpredictable due to information warfareand is prone to various attacks. Such at...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Part 5: NETWORK FORENSICSInternational audienceDespite extensive research on malware and Trojan hors...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
Since the dawn of human communications, there have been people that have wished to correspond secret...
Indirect communication channels have been effectively employed in the communications world to bypass...
Covert channels are mechanisms for communicating infor-mation in ways that are dicult to detect. Dat...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
Computer network is unpredictable due to information warfareand is prone to various attacks. Such at...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
[[abstract]]Covert channels are illicit means of leaking sensitive or private information through sy...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...