Results 11 to 20 of about 72,081 (273)
With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data.
Parisa Rahimi +2 more
doaj +1 more source
A Novel Covert Channel for IEEE 802.11 Networks Utilizing MAC Address Randomization
Vendors implement the MAC address randomization technique to prevent IEEE 802.11 client station devices from being tracked. Although it conceals device identity, it cannot hide its occurring data transmission.
Geovani Teca, Marek Natkaniec
doaj +1 more source
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj +1 more source
A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment
In the existing network covert channel research, the transmission of secret messages is one-way, lacking confirmation feedback on whether the secret message is successfully accepted. However, voice over LTE (VoLTE) has real-time interactive features, and
Xiaosong Zhang +3 more
doaj +1 more source
Network covert channels capacity limitation by adding random delays before packet sending
Attention to covert channels has largely increased due to the documents published by E. Snowden, which described the software and hardware embedding that implement undeclared features of covert information transfer in the Huawei and Juniper network ...
Anna I. Belozubova +2 more
doaj +1 more source
Information Hiding Techniques Using Network Protocols [PDF]
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj +1 more source
An Enlarging-the-Capacity Packet Sorting Covert Channel
The construction method of the covert channel has always been a topic of research and exploration in the field of information security, and the use of IP data packets for covert channel construction is also an important method. Based on the above content,
Lejun Zhang +4 more
doaj +1 more source
CCALK: (When) CVA6 Cache Associativity Leaks the Key
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS.
Valentin Martinoli +3 more
doaj +1 more source
Owing to their hidden natures, covert channels can be utilized such that trojan applications can communicate stealthily with each other or exchange stolen private information without being revealed.
Jun-Won Ho
doaj +1 more source
Covert Communication in Fading Channels under Channel Uncertainty [PDF]
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public ...
Shahzad, Khurram +2 more
core +2 more sources

