Results 221 to 230 of about 72,081 (273)

Neural dynamics of covert habit activation and control in humans

open access: yes
Buabang EK   +8 more
europepmc   +1 more source

Exploring Covert Channels

2011 44th Hawaii International Conference on System Sciences, 2011
Covert channels pose a threat to system security for many reasons. One of the most significant security concerns surrounding the use of covert channels in computer and information systems involves confidentiality and the ability to leak confidential information from a high level security user to a low level one covertly.
J Jaskolka, R Khedri
openaire   +1 more source

IP covert timing channels

Proceedings of the 11th ACM conference on Computer and communications security, 2004
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In this paper, we describe our implementation of a covert network timing channel, discuss the subtle issues that arose in its design, and present performance data for the ...
Serdar Cabuk   +2 more
openaire   +1 more source

Detecting covert timing channels

Proceedings of the 14th ACM conference on Computer and communications security, 2007
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing channels is a challenging task.
Steven Gianvecchio, Haining Wang
openaire   +1 more source

Covert Channel Capacity

1987 IEEE Symposium on Security and Privacy, 1987
Techniques for detecting covert channels are based on information flow models. This paper establishes a connection between Shannon's theory of communication and information flow models, such as the Goguen-Meseguer model, that view a reference monitor as a state-transition automaton.
openaire   +1 more source

IP Covert Channel Detection

ACM Transactions on Information and System Security, 2009
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from
Serdar Cabuk   +2 more
openaire   +1 more source

Multiple Access Covert Channels

2005
Abstract : In this paper we consider the situation of multiple malicious transmitters attempting to covertly communicate with a single receiver, We show how the situation of non-collaborating transmitters can be modeled by multiple access channels. The simpler situation of collaborating transmitters is used as a bounding result.
Richard E. Newman, Ira S. Moskowitz
openaire   +1 more source

Covert Channels in LAN's

IEEE Transactions on Software Engineering, 1987
An information transfer path that allows information to be transferred in a manner that violates the security policy of a trusted network is called a covert channel.
openaire   +1 more source

Home - About - Disclaimer - Privacy