A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment
暂无分享,去创建一个
Xiaosong Zhang | Yuan Xue | Linhong Guo | Quanxin Zhang | Quan-xin Zhang | Xiaosong Zhang | Yuan Xue | Linhong Guo
[1] Saurabh Bagchi,et al. TCP/IP Timing Channels: Theory to Implementation , 2009, IEEE INFOCOM 2009.
[2] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[3] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[4] Yuewei Dai,et al. Network covert timing channel with distribution matching , 2012, Telecommun. Syst..
[5] Marston D. E. Conder,et al. Explicit definition of the binary reflected Gray codes , 1999, Discret. Math..
[6] Xiapu Luo,et al. TCP covert timing channels: Design and detection , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[7] Xianmin Wang,et al. Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..
[8] Liehuang Zhu,et al. A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..
[9] Chen Liang,et al. Covert Timing Channels for IoT over Mobile Networks , 2018, IEEE Wireless Communications.
[10] Craig A. Shue,et al. Reporting Insider Threats via Covert Channels , 2013, 2013 IEEE Security and Privacy Workshops.
[11] Wojciech Mazurczyk,et al. Information Hiding Using Improper frame padding , 2010, 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS).
[12] Todd P. Coleman,et al. Covert timing channels codes for communication over interactive traffic , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Chen Liang,et al. RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..
[14] Yongji Wang,et al. Improving performance of network covert timing channel through Huffman coding , 2012, Math. Comput. Model..
[15] Javier López,et al. Covert communications through network configuration messages , 2013, Comput. Secur..
[16] C. Gray Girling,et al. Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.
[17] Nikita Borisov,et al. CoCo: Coding-Based Covert Timing Channels for Network Flows , 2011, Information Hiding.
[18] Weiwei Liu,et al. Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation , 2016, IEEE Transactions on Information Forensics and Security.
[19] Wojciech Mazurczyk,et al. Evaluation of steganographic methods for oversized IP packets , 2012, Telecommun. Syst..
[20] Yu Zhang,et al. A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..
[21] W. Marsden. I and J , 2012 .
[22] C. Brodley,et al. Network covert channels: design, analysis, detection, and elimination , 2006 .
[23] Ehab Al-Shaer,et al. Building Covert Channels over the Packet Reordering Phenomenon , 2009, IEEE INFOCOM 2009.
[24] Dipak Ghosal,et al. A Covert Timing Channel Based on Fountain Codes , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[25] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[26] Gordon B. Agnew,et al. Turbo covert channel: An iterative framework for covert communication over data networks , 2013, 2013 Proceedings IEEE INFOCOM.
[27] Chen Liang,et al. An end-to-end covert channel via packet dropout for mobile networks , 2018, Int. J. Distributed Sens. Networks.
[28] Neil Genzlinger. A. and Q , 2006 .
[29] Kim-Kwang Raymond Choo,et al. Exfiltrating data from Android devices , 2015, Comput. Secur..
[30] Chen Liang,et al. Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..
[31] Rennie Archibald. Design and Detection of Covert Communication: Timing Channels and Application Tunneling , 2013 .