Results 1 to 10 of about 72,081 (273)

Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems [PDF]

open access: yesSensors, 2023
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two entities that are not authorized to share data. The secret data is encoded
Ivan Miketic   +2 more
doaj   +2 more sources

NN-Based 8FSK Demodulator for the Covert Channel [PDF]

open access: yesSensors, 2022
In this article, a superposition-based covert channel and its demodulator were proposed and examined. As a covert waveform, an 8FSK modulation was selected.
Krystian Grzesiak, Zbigniew Piotrowski
doaj   +2 more sources

Cross-World Covert Channel on ARM Trustzone through PMU [PDF]

open access: yesSensors, 2022
The TrustZone technology is incorporated in a majority of recent ARM Cortex A and Cortex M processors widely deployed in the IoT world. Security critical code execution inside a so-called secure world is isolated from the rest of the application ...
Xinyao Li, Akhilesh Tyagi
doaj   +2 more sources

CASPER: Covert Channel Using Internal Speakers. [PDF]

open access: yesSensors (Basel), 2023
In recent years, researchers have studied various methods for transferring data in a network-separated environment, and the most representative method is the use of inaudible frequency signals like ultrasonic waves. This method has the advantage of being able to transfer data without other people noticing, but it has the disadvantage that speakers must
Choi H, Jung JH, Yoon JW.
europepmc   +4 more sources

A Formulation of the Potential for Communication Condition using C2KA [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this
Jason Jaskolka, Ridha Khedri
doaj   +6 more sources

Relay Selection for Covert Communication with an Active Warden [PDF]

open access: yesSensors
In this paper, we consider covert communication with multiple relays and an active warden who not only sends jamming signals but also aims to detect the covert transmission.
Jong Yeol Ryu, Jung Hoon Lee
doaj   +2 more sources

HTTP Parameter Sorting Covert Channel Detection Method Based on Markov Model [PDF]

open access: yesJisuanji gongcheng, 2020
The network covert channel is a communication channel that establishes secret message transmission between different hosts on the network by utilizing reserved,optional or undefined fields in the network protocols.HTTP protocol,as one of the most ...
SHEN Guoliang, ZHAI Jiangtao, DAI Yuewei
doaj   +1 more source

A Construction Method of Covert Channel Based on File Storage Distribution [PDF]

open access: yesJisuanji gongcheng, 2017
A covert channel construction method based on covert information storage distribution is proposed to solve the problem that the existing reference length covert channels are different from legal channels in the channel entropy and length distribution ...
LU Siyan,LAN Shaohua
doaj   +1 more source

COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj   +1 more source

Survey on key technologies of covert channel in ubiquitous network environment

open access: yesTongxin xuebao, 2022
In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The ...
Fenghua LI   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy