Results 31 to 40 of about 28,210 (305)
Identification of DNS covert channel based on improved convolutional neural network
In order to effectively identify the multiple types of DNS covert channels,the implementation of different sorts of DNS covert channel software was studied,and a detection based on the improved convolutional neural network was proposed.The experimental ...
Meng ZHANG, Haoliang SUN, Peng YANG
doaj +2 more sources
Covert sensing using floodlight illumination [PDF]
We propose a scheme for covert active sensing using floodlight illumination from a THz-bandwidth amplified spontaneous emission (ASE) source and heterodyne detection.
Bash, Boulat A. +4 more
core +3 more sources
Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems
Proactive eavesdropping is an effective method for government to monitor suspicious users who are deemed to misuse communication systems for illegal activities. In this paper, considering that a legitimate full-duplex (FD) eavesdropper tries to monitor a
Xingbo Lu +3 more
doaj +1 more source
Performance Comparison of Relay-Based Covert Communications: DF, CF and AF
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF).
Jihwan Moon
doaj +1 more source
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior ...
Sunil Gautam +4 more
doaj +1 more source
Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure
When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted.
Xiao-Hang Wang +7 more
doaj +1 more source
Combating Adversarial Covert Channels in Wi-Fi Networks
Physical layer covert channels exploit the characteristics of radio signals to convey secret messages while remaining inconspicuous within wireless channels.
Hoorin Park +4 more
doaj +1 more source
Covert Capacity of Non-Coherent Rayleigh-Fading Channels
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden.
Bloch, Matthieu R. +2 more
core +2 more sources
USBcat - Towards an Intrusion Surveillance Toolset
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chapman, Chris, Dean, Tom, Knight, Scott
core +4 more sources
Secret key expansion from covert communication
Covert communication allows us to transmit messages in such a way that it is not possible to detect that the communication is occurring. This provides protection in situations where knowledge that people are talking to each other may be incriminating to ...
Amiri, Ryan, Arrazola, Juan Miguel
core +1 more source

