A Covert Queueing Channel in FCFS Schedulers
暂无分享,去创建一个
[1] Donald F. Towsley,et al. Covert communications on Poisson packet channels , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[3] Xun Gong,et al. Sneak-Peek: High speed covert channels in data center networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[4] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[5] Charles V. Wright,et al. Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.
[6] Xun Gong,et al. Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers , 2016, IEEE/ACM Transactions on Networking.
[7] Parv Venkitasubramaniam,et al. Mitigating timing based information leakage in shared schedulers , 2012, 2012 Proceedings IEEE INFOCOM.
[8] Xun Gong,et al. Information theoretic analysis of side channel information leakage in FCFS schedulers , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[9] Todd P. Coleman,et al. Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels , 2012, IEEE Transactions on Information Forensics and Security.
[10] Sergio Verdú,et al. Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[11] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[12] Xun Gong,et al. Capacity limit of queueing timing channel in shared FCFS schedulers , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[13] Yi Lu,et al. A Covert Queueing Channel in Round Robin Schedulers , 2017, ArXiv.
[14] Virgil Gligor. Covert Channel Analysis of Trusted Systems. A Guide to Understanding , 1993 .
[15] F. Alajaji,et al. Lectures Notes in Information Theory , 2000 .
[16] Xun Gong,et al. Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks , 2010, 2010 IEEE International Conference on Communications.
[17] Alan Miller,et al. An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite , 2005, ECIW.
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Pritam Mukherjee,et al. Covert bits through queues , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[20] Sibin Mohan,et al. Schedule-Based Side-Channel Attack in Fixed-Priority Real-time Systems , 2015 .
[21] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[22] Donald F. Towsley,et al. Covert communications on renewal packet channels , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[23] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[24] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[25] Nikita Borisov,et al. Website Detection Using Remote Traffic Analysis , 2011, Privacy Enhancing Technologies.
[26] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[27] Steven Gianvecchio,et al. Detecting covert timing channels: an entropy-based approach , 2007, CCS '07.
[28] Ira S. Moskowitz,et al. A Network Pump , 1996, IEEE Trans. Software Eng..