Covert Channel in the BitTorrent Tracker Protocol
暂无分享,去创建一个
[1] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[2] Xingming Sun,et al. A Steganography Scheme in P2P Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[3] Patrick Butler,et al. Quantitatively Analyzing Stealthy Communication Channels , 2011, ACNS.
[4] Christopher Krügel,et al. Overbot: a botnet protocol based on Kademlia , 2008, SecureComm.
[5] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[6] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[7] Bo Yuan,et al. Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks , 2010 .
[8] Daryl Johnson,et al. Behavior-Based Covert Channel in Cyberspace , 2009 .
[9] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.