Fundamental Limits of Covert Packet Insertion
暂无分享,去创建一个
Donald F. Towsley | Dennis Goeckel | Amir Houmansadr | Ramin Soltani | Amir Houmansadr | A. Houmansadr | D. Goeckel | Ramin Soltani | D. Towsley
[1] Donald F. Towsley,et al. Covert communications on Poisson packet channels , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] Gaurav Shah,et al. Keyboards and Covert Channels , 2006, USENIX Security Symposium.
[3] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[4] Asaf Cohen,et al. Rate vs. Covertness for the Packet Insertion Problem , 2018, 2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE).
[5] R. C. Srivastava. On a characterization of the Poisson process , 1971 .
[6] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[7] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[8] D. Iglehart. Extreme Values in the GI/G/1 Queue , 1972 .
[9] Donald F. Towsley,et al. Covert communications on renewal packet channels , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] J. Gurland,et al. On regularity conditions for maximum likelihood estimators , 1954 .
[11] Jianying Zhou,et al. Wireless Sensor Network Security , 2008 .
[12] Feng Shu,et al. Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.
[13] U. Narayan Bhat,et al. An Introduction to Queueing Theory: Modeling and Analysis in Applications , 2006 .
[14] Saikat Guha,et al. Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.
[15] Feng Shu,et al. Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[16] Saurabh Bagchi,et al. TCP/IP Timing Channels: Theory to Implementation , 2009, IEEE INFOCOM 2009.
[17] Mayank Bakshi,et al. Reliable deniable communication with channel uncertainty , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[18] Zhang Hanqin,et al. MULTIPLE CHANNEL QUEUES IN HEAVY TRAFFIC , 1990 .
[19] Alan F. Karr,et al. Point Processes and Their Statistical Inference , 1991 .
[20] Xiangyun Zhou,et al. Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.
[21] Rachel Greenstadt,et al. Covert Messaging through TCP Timestamps , 2002, Privacy Enhancing Technologies.
[22] Saurabh Bagchi,et al. Capacity Bounds on Timing Channels with Bounded Service Times , 2007, 2007 IEEE International Symposium on Information Theory.
[23] J. A. Ferreira. Pairs of renewal processes whose superposition is a renewal process , 2000 .
[24] Matthieu R. Bloch,et al. Covert communication over broadcast channels , 2017, 2017 IEEE Information Theory Workshop (ITW).
[25] Richard A. Kemmerer,et al. Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.
[26] Solomon Kullback,et al. Information Theory and Statistics , 1970, The Mathematical Gazette.
[27] Marvin K. Simon,et al. Spread Spectrum Communications Handbook , 1994 .
[28] Donald F. Towsley,et al. Fundamental Limits of Invisible Flow Fingerprinting , 2020, IEEE Transactions on Information Forensics and Security.
[29] Robust and Undetectable Covert Timing Channels for i.i.d. Traffic , 2010 .
[30] C. Brodley,et al. Network covert channels: design, analysis, detection, and elimination , 2006 .
[31] C. Gray Girling,et al. Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.
[32] Dennis Goeckel,et al. Limits of location privacy under anonymization and obfuscation , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[33] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[34] Dipak Ghosal,et al. A Covert Timing Channel Based on Fountain Codes , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[35] Xiaohui Liang,et al. Privacy-Preserving mHealth Data Release with Pattern Consistency , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[36] Sushil Jajodia,et al. Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.
[37] Todd P. Coleman,et al. Covert timing channels codes for communication over interactive traffic , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[38] Mayank Bakshi,et al. Reliable, deniable, and hidable communication over multipath networks , 2014, 2014 IEEE International Symposium on Information Theory.
[39] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[40] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[41] Ramin Soltani,et al. FUNDAMENTAL LIMITS OF COVERT COMMUNICATION IN PACKET CHANNELS , 2019 .
[42] Robert J. Baxley,et al. Achieving positive rate with undetectable communication over AWGN and Rayleigh channels , 2014, 2014 IEEE International Conference on Communications (ICC).
[43] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[44] Jonathan K. Millen,et al. Covert Channel Capacity , 1987, 1987 IEEE Symposium on Security and Privacy.
[45] Steven Gianvecchio,et al. Detecting covert timing channels: an entropy-based approach , 2007, CCS '07.
[46] Ira S. Moskowitz,et al. Noisy Timing Channels with Binary Inputs and Outputs , 2006, Information Hiding.
[47] Matthieu R. Bloch,et al. Covert Communication Over a $K$ -User Multiple-Access Channel , 2018, IEEE Transactions on Information Theory.
[48] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[49] Ira S. Moskowitz,et al. Simple timing channels , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[50] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[51] Donald F. Towsley,et al. Towards provably invisible network flow fingerprints , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.
[52] Nikita Borisov,et al. CoCo: Coding-Based Covert Timing Channels for Network Flows , 2011, Information Hiding.
[53] Don H. Johnson,et al. Calculation of the Kullback-Leibler distance between point process models , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[54] Xiangyun Zhou,et al. Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.
[55] Donald F. Towsley,et al. Quantum noise limited optical communication with low probability of detection , 2013, 2013 IEEE International Symposium on Information Theory.
[56] Hamid Sharif,et al. Analysis and evaluation of covert channels over LTE advanced , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[57] Todd P. Coleman,et al. Novel Shaping and Complexity-Reduction Techniques for Approaching Capacity over Queuing Timing Channels , 2009, 2009 IEEE International Conference on Communications.
[58] Lizhong Zheng,et al. Limits of low-probability-of-detection communication over a discrete memoryless channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[59] Wojciech Mazurczyk,et al. Lost audio packets steganography: the first practical evaluation , 2011, Secur. Commun. Networks.
[60] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[61] Derrick Wing Kwan Ng,et al. Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.
[62] Donald F. Towsley,et al. Covert single-hop communication in a wireless network with distributed artificial noise generation , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[63] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[64] Roksana Boreli,et al. Asynchronous Covert Communication Using BitTorrent Trackers , 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS).
[65] Grzegorz Lewandowski,et al. Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.
[66] Sergio Verdú,et al. Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[67] David Pollino,et al. Wireless security , 2002 .
[68] Hamid Sharif,et al. Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic , 2017, IEEE Transactions on Dependable and Secure Computing.
[69] Ira S. Moskowitz,et al. The channel capacity of a certain noisy timing channel , 1992, IEEE Trans. Inf. Theory.
[70] Matthieu R. Bloch,et al. Covert Capacity of Non-Coherent Rayleigh-Fading Channels , 2018, IEEE Transactions on Information Theory.
[71] E. Çinlar,et al. On the Superposition of Point Processes , 1968 .
[72] Hong Zhao,et al. WLAN covert timing channel detection , 2015, 2015 Wireless Telecommunications Symposium (WTS).
[73] Matthieu R. Bloch,et al. Secure bits through queues , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.
[74] Dominic J. A. Welsh,et al. Complexity and cryptography - an introduction , 2006 .
[75] Anand S. Bedekar,et al. The Information-Theoretic Capacity of Discrete-Time Queues , 1997, IEEE Trans. Inf. Theory.
[76] Yuewei Dai,et al. Network covert timing channel with distribution matching , 2012, Telecommun. Syst..
[77] Donald F. Towsley,et al. Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.
[78] Stefan Katzenbeisser,et al. Hide and Seek in Time - Robust Covert Timing Channels , 2009, ESORICS.
[79] Loïc Hélouët,et al. Covert channel detection using Information Theory , 2010, SecCo.
[80] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[81] Fahimeh Rezaei,et al. A Novel Approach towards Real-Time Covert Timing Channel Detection , 2015 .
[82] Jun Li,et al. Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).
[83] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[84] Evgueni A. Haroutunian,et al. Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.
[85] Donald F. Towsley,et al. Fundamental Limits of Covert Bit Insertion in Packets , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[86] Donald F. Towsley,et al. Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[87] Wojciech Mazurczyk,et al. Covert Channels in SIP for VoIP signalling , 2008, ArXiv.
[88] Jonathan K. Millen. Finite-state noiseless covert channels , 1989, Proceedings of the Computer Security Foundations Workshop II,.