Model-Based Covert Timing Channels: Automated Modeling and Evasion
暂无分享,去创建一个
Sushil Jajodia | Duminda Wijesekera | Steven Gianvecchio | Haining Wang | S. Jajodia | D. Wijesekera | Haining Wang | Steven Gianvecchio
[1] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[2] Xinwen Fu,et al. DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Gaurav Shah,et al. Keyboards and Covert Channels , 2006, USENIX Security Symposium.
[4] Dong Xu,et al. Characteristics of network delay and delay jitter and its effect on voice over IP (VoIP) , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[5] David G. Stork,et al. Pattern Classification , 1973 .
[6] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[7] Ira S. Moskowitz,et al. A pump for rapid, reliable, secure communication , 1993, CCS '93.
[8] Richard E. Blahut,et al. Computation of channel capacity and rate-distortion functions , 1972, IEEE Trans. Inf. Theory.
[9] Raymond R. Hill,et al. Discrete-Event Simulation: A First Course , 2007, J. Simulation.
[10] Mike Fisk,et al. Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.
[11] Ira S. Moskowitz,et al. The Pump: a decade of covert fun , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[12] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[13] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[14] Kevin Borders,et al. Web tap: detecting covert web traffic , 2004, CCS '04.
[15] Bruce E. Hajek,et al. An information-theoretic and game-theoretic study of timing channels , 2002, IEEE Trans. Inf. Theory.
[16] Ira S. Moskowitz,et al. A network version of the Pump , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[17] Douglas S. Reeves,et al. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.
[18] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[19] Steven Gianvecchio,et al. Detecting covert timing channels: an entropy-based approach , 2007, CCS '07.
[20] Yunheung Paek,et al. Advances in Computer Systems Architecture , 2008 .
[21] Xiapu Luo,et al. Cloak: A Ten-Fold Way for Reliable Covert Communications , 2007, ESORICS.
[22] Vincent H. Berk,et al. Covert Channel Detection Using Process Query Systems , 2005 .
[23] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[24] Peng Ning,et al. On the secrecy of timing-based active watermarking trace-back techniques , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[25] Jin Cao,et al. On the nonstationarity of Internet traffic , 2001, SIGMETRICS '01.
[26] Suguru Arimoto,et al. An algorithm for computing the capacity of arbitrary discrete memoryless channels , 1972, IEEE Trans. Inf. Theory.
[27] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.