A novel anti-detection criterion for covert storage channel threat estimation

[1]  Josep Torrellas,et al.  ReplayConfusion: Detecting cache-based covert channel attacks using record and replay , 2016, 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).

[2]  Yongji Wang,et al.  Designing and Modeling of Covert Channels in Operating Systems , 2016, IEEE Transactions on Computers.

[3]  Yongji Wang,et al.  Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation , 2013, 2013 IEEE Seventh International Conference on Software Security and Reliability Companion.

[4]  Wu Jingzheng,et al.  Covert Channel Research , 2010 .

[5]  Kaihua Ding,et al.  Methods of determining weight scaling factors for geodetic–geophysical joint inversion , 2009 .

[6]  Carla E. Brodley,et al.  IP covert timing channels: design and detection , 2004, CCS '04.

[7]  I. S. Moskowitz,et al.  Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.