Glavlit: Preventing Exfiltration at Wire Speed
暂无分享,去创建一个
[1] Claus Brabrand,et al. Static validation of dynamically generated HTML , 2001, PASTE '01.
[2] Ira S. Moskowitz,et al. The Pump: a decade of covert fun , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[3] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[4] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[5] Maxim Anikeev,et al. Network Based Detection of Passive Covert Channels in TCP/IP , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[6] Mike Fisk,et al. Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.
[7] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[8] Nick Feamster,et al. Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.