Time is on my side: Steganography in filesystem metadata
暂无分享,去创建一个
Stefan Katzenbeisser | Edgar R. Weippl | Artemios G. Voyiatzis | Stefan Brunthaler | Sebastian Neuner | Martin Schmiedecker | E. Weippl | S. Katzenbeisser | Martin Schmiedecker | A. Voyiatzis | S. Neuner | Stefan Brunthaler
[1] Kainan Chen. No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state , 2017 .
[2] Kilroy,et al. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. By Glenn Greenwald, New York, NY: Metropolitan Books, 2014. , 2016 .
[3] John Aycock,et al. Permutation Steganography in FAT Filesystems , 2015, Trans. Data Hiding Multim. Secur..
[4] Yun Q. Shi,et al. Transactions on Data Hiding and Multimedia Security X , 2015, Lecture Notes in Computer Science.
[5] Kamred UdhamSingh. A Survey on Image Steganography Techniques , 2014 .
[6] Hakim Weatherspoon,et al. PHY Covert Channels: Can you see the Idles? , 2014, NSDI.
[7] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[8] W. Mazurczyk,et al. Trends in steganography , 2014, Commun. ACM.
[9] Josef Bacik,et al. BTRFS: The Linux B-Tree Filesystem , 2013, TOS.
[10] Gyu-Sang Cho. A computer forensic method for detecting timestamp forgery in NTFS , 2013, Comput. Secur..
[11] Edgar R. Weippl,et al. Quantifying Windows File Slack Size and Stability , 2013, IFIP Int. Conf. Digital Forensics.
[12] Daniel Anderson,et al. Splinternet Behind the Great Firewall of China , 2012 .
[13] Kevin D. Fairbanks. An analysis of Ext4 for digital forensics , 2012 .
[14] Jiaohua Qin,et al. Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .
[15] Simson L. Garfinkel,et al. Digital forensics XML and the DFXML toolset , 2012, Digit. Investig..
[16] Fauzan Mirza,et al. Designing a cluster-based covert channel to evade disk investigation and forensics , 2011, Comput. Secur..
[17] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[18] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[19] Wojciech Mazurczyk,et al. LACK—a VoIP steganographic method , 2008, Telecommun. Syst..
[20] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[21] Eugene Antsilevich. Capturing Timestamp Precision for Digital Forensics , 2009 .
[22] Aaron Burghardt,et al. Using the HFS+ journal for deleted file recovery , 2008 .
[23] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[24] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[25] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[26] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[27] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[28] Joanna Rutkowska joanna. The Implementation of Passive Covert Channels in the Linux Kernel , 2004 .
[29] Ohad Rodeh,et al. zFS - a scalable distributed file system using object disks , 2003, 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies, 2003. (MSST 2003). Proceedings..
[30] Kian-Lee Tan,et al. StegFS: a steganographic file system , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[31] Rachel Greenstadt,et al. Covert Messaging through TCP Timestamps , 2002, Privacy Enhancing Technologies.
[32] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[33] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[34] Markus G. Kuhn,et al. StegFS: A Steganographic File System for Linux , 1999, Information Hiding.
[35] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[36] Adi Shamir,et al. The Steganographic File System , 1998, Information Hiding.
[37] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[38] M. Neusten. Telecommunication systems. , 1976, Advances in ophthalmology = Fortschritte der Augenheilkunde = Progres en ophtalmologie.