Detection of Size Modulation Covert Channels Using Countermeasure Variation
暂无分享,去创建一个
Wojciech Mazurczyk | Steffen Wendzel | Florian Link | Daniela Eller | W. Mazurczyk | F. Link | S. Wendzel | Daniela Eller
[1] Manfred Wolf. Covert Channels in LAN Protocols , 1989, LANSEC.
[2] Weijia Jia,et al. Novel Packet Size-Based Covert Channel Attacks against Anonymizer , 2013, IEEE Transactions on Computers.
[3] C. Gray Girling,et al. Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.
[4] Sebastian Zander,et al. Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures , 2016 .
[5] Xiamu Niu,et al. A Novel Covert Channel Based on Length of Messages , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[6] Carla E. Brodley,et al. IP Covert Channel Detection , 2009, TSEC.
[7] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[8] Steffen Wendzel,et al. Detection of Covert Channels in TCP Retransmissions , 2018, NordSec.
[9] Wojciech Mazurczyk,et al. Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.
[10] Muawia A. Elsadig,et al. A balanced approach to eliminate packet length-based covert channels , 2017, 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS).
[11] Sebastian Zander,et al. Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..
[12] Wojciech Mazurczyk,et al. Evaluation of steganographic methods for oversized IP packets , 2012, Telecommun. Syst..
[13] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[14] Wojciech Mazurczyk,et al. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach , 2018, ARES.
[15] Peter Sommerlad,et al. Security Patterns: Integrating Security and Systems Engineering , 2006 .
[16] Jonathan K. Millen. 20 years of covert channel modeling and analysis , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[17] Wojciech Mazurczyk,et al. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels , 2018, CECC.
[18] Aladdin Enterprises,et al. ZLIB Compressed Data Format Specification version 3.3 , 1996 .
[19] Wojciech Mazurczyk,et al. Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats , 2014, ISSE.