Using covert channels to evaluate the effectiveness of flow confidentiality measures
暂无分享,去创建一个
[1] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[2] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.
[3] Riccardo Bettati,et al. On effectiveness of link padding for statistical traffic analysis attacks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[4] Bruce Hajek,et al. The jamming game for packet timing channels , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[5] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[6] Riccardo Bettati,et al. Analytical and empirical analysis of countermeasures to traffic analysis attacks , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..