Results 221 to 230 of about 72,081 (273)
Revolutionary hybrid ensembled deep learning model for accurate and robust side-channel attack detection in cloud computing. [PDF]
Reddy CL, Malathi K.
europepmc +1 more source
Neural dynamics of covert habit activation and control in humans
Buabang EK +8 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2011 44th Hawaii International Conference on System Sciences, 2011
Covert channels pose a threat to system security for many reasons. One of the most significant security concerns surrounding the use of covert channels in computer and information systems involves confidentiality and the ability to leak confidential information from a high level security user to a low level one covertly.
J Jaskolka, R Khedri
openaire +1 more source
Covert channels pose a threat to system security for many reasons. One of the most significant security concerns surrounding the use of covert channels in computer and information systems involves confidentiality and the ability to leak confidential information from a high level security user to a low level one covertly.
J Jaskolka, R Khedri
openaire +1 more source
Proceedings of the 11th ACM conference on Computer and communications security, 2004
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In this paper, we describe our implementation of a covert network timing channel, discuss the subtle issues that arose in its design, and present performance data for the ...
Serdar Cabuk +2 more
openaire +1 more source
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In this paper, we describe our implementation of a covert network timing channel, discuss the subtle issues that arose in its design, and present performance data for the ...
Serdar Cabuk +2 more
openaire +1 more source
Detecting covert timing channels
Proceedings of the 14th ACM conference on Computer and communications security, 2007The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing channels is a challenging task.
Steven Gianvecchio, Haining Wang
openaire +1 more source
1987 IEEE Symposium on Security and Privacy, 1987
Techniques for detecting covert channels are based on information flow models. This paper establishes a connection between Shannon's theory of communication and information flow models, such as the Goguen-Meseguer model, that view a reference monitor as a state-transition automaton.
openaire +1 more source
Techniques for detecting covert channels are based on information flow models. This paper establishes a connection between Shannon's theory of communication and information flow models, such as the Goguen-Meseguer model, that view a reference monitor as a state-transition automaton.
openaire +1 more source
ACM Transactions on Information and System Security, 2009
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from
Serdar Cabuk +2 more
openaire +1 more source
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from
Serdar Cabuk +2 more
openaire +1 more source
Multiple Access Covert Channels
2005Abstract : In this paper we consider the situation of multiple malicious transmitters attempting to covertly communicate with a single receiver, We show how the situation of non-collaborating transmitters can be modeled by multiple access channels. The simpler situation of collaborating transmitters is used as a bounding result.
Richard E. Newman, Ira S. Moskowitz
openaire +1 more source
IEEE Transactions on Software Engineering, 1987
An information transfer path that allows information to be transferred in a manner that violates the security policy of a trusted network is called a covert channel.
openaire +1 more source
An information transfer path that allows information to be transferred in a manner that violates the security policy of a trusted network is called a covert channel.
openaire +1 more source

