Results 231 to 240 of about 72,081 (273)
Some of the next articles are maybe not open access.
2006
A covert channel is a communication path that allows transferring information in a way that violates a system security policy. Because of their concealed nature, detecting and preventing covert channels are obligatory security practices. In this paper, we present an examination of network storage channels in the Internet Protocol version 6 (IPv6).
Norka B. Lucena +2 more
openaire +1 more source
A covert channel is a communication path that allows transferring information in a way that violates a system security policy. Because of their concealed nature, detecting and preventing covert channels are obligatory security practices. In this paper, we present an examination of network storage channels in the Internet Protocol version 6 (IPv6).
Norka B. Lucena +2 more
openaire +1 more source
Concurrent Covert Communication Channels
2010This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8 × 8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a ...
Md Amiruzzaman +3 more
openaire +1 more source
Towards Reversible Storage Network Covert Channels
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019The use of network covert channels to improve privacy or support security threats has been widely discussed in the literature. As today, the totality of works mainly focuses on how to not disrupt the overt traffic flow and the performance of the covert channels in terms of undetectability and capacity.
W Mazurczyk +3 more
openaire +3 more sources
Covert Channel Invisibility Theorem
2007We consider a sequence of finite products of a finite set. A statistical test problem is defined on every product. Consistent sequences of probability measures on these products of the set generate probability measures on the set of infinite sequences. Sufficient conditions of nonexistence for consistent test sequences are proved.
Alexander Grusho +2 more
openaire +1 more source
Proceedings of the 4th international conference on Security of information and networks, 2011
This paper presents a new covert channel based on Google Analytic web cookies in HTTP protocol. The new covert channel is difficult to disrupt and is capable of reasonably high bandwidths. The Google Analytic framework is used by over half of the most popular web sites currently on the Internet; its ubiquitousness across the web implies a great impact ...
William Huba +3 more
openaire +1 more source
This paper presents a new covert channel based on Google Analytic web cookies in HTTP protocol. The new covert channel is difficult to disrupt and is capable of reasonably high bandwidths. The Google Analytic framework is used by over half of the most popular web sites currently on the Internet; its ubiquitousness across the web implies a great impact ...
William Huba +3 more
openaire +1 more source
2016
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channels, is defined as an unintentional communication channel established between systems that are physically and electronically isolated from one another. A specific class of air-gap covert channel is studied in depth, out-of-band covert channels (OOB-CCs ...
openaire +2 more sources
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channels, is defined as an unintentional communication channel established between systems that are physically and electronically isolated from one another. A specific class of air-gap covert channel is studied in depth, out-of-band covert channels (OOB-CCs ...
openaire +2 more sources
Covert Channel Secure Hypercube Message Communication
Journal of Parallel and Distributed Computing, 1995Abstract The hypercube multiprocessor is a popular architecture in parallel computing environments. Recently, computer security and privacy issues have gained significance. This paper considers the security issues of a network of processors connected over a hypercube topology.
Bhattacharya, Sourav +2 more
openaire +2 more sources
Covert Channels with Transducers
2009Covert channels represent a security problem for information systems, since they permit illegal flows and sometimes leaks of classified data. Although numerous descriptions have been given at a concrete level, relatively few work has been carried out at a more abstract level.
Benattar, Gilles +5 more
openaire +1 more source
An Analysis of Covert Timing Channels
Journal of Computer Security, 1992Covert channels have traditionally been categorized as either storage channels or timing channels [8, 9]. This paper questions this categorization, and discusses channels that cannot be clearly identified as either storage or timing channels, but have aspects of both.
openaire +1 more source
Covert Channel Detection Methods
2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA), 2022Adrian Ondov, Pavol Helebrandt
openaire +1 more source

