Results 31 to 40 of about 163,707 (282)

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]

open access: yes, 2020
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core   +1 more source

Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6 [PDF]

open access: yes, 2016
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications.
Ma, X, Peytchev, E, Salih, A
core   +1 more source

Covert communication in relay and RIS networks

open access: yesSecurity and Safety, 2023
Covert communication aims to prevent the warden from detecting the presence of communications, i.e. with a negligible detection probability. When the distance between the transmitter and the legitimate receiver is large, large transmission power is ...
Hu Jinsong   +4 more
doaj   +1 more source

BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations

open access: yes, 2015
It has been assumed that the physical separation (air-gap) of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible.
Elovici, Yuval   +3 more
core   +1 more source

Enhancing Covert Secrecy Rate in a Zero-Forcing UAV Jammer-Assisted Covert Communication

open access: yesIEEE Wireless Communications Letters
Covert communications can hide confidential signals in environmental noise to avoid being detected and provide comprehensive security for wireless transmissions. However, there still exist significant risks in wireless transmission once being detected.
Xinying Chen   +2 more
openaire   +2 more sources

Research on Covert Channels Based on Block Coding of MQTT Protocol Commands [PDF]

open access: yesJisuanji gongcheng, 2019
The carrier of traditional network covert channels is limited to the Internet protocol.To address this problem,based on the research of the Message Queuing Telemetry Transmission(MQTT) protocol at the application layer of Internet of Things(IoT),this ...
DENG Yuxin, TANG Zhangguo, ZHANG Jian, LI Huanzhou
doaj   +1 more source

A Covert Queueing Channel in FCFS Schedulers

open access: yes, 2018
We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be exploited in shared queues across supposedly isolated users.
Ghassami, AmirEmad, Kiyavash, Negar
core   +1 more source

Performance analysis of covert wireless communication based on beam forming with noise uncertainty

open access: yesTongxin xuebao, 2020
In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the ...
Yuda LIN   +3 more
doaj   +2 more sources

No Advantage for Separating Overt and Covert Attention in Visual Search

open access: yesVision, 2020
We move our eyes roughly three times every second while searching complex scenes, but covert attention helps to guide where we allocate those overt fixations.
W. Joseph MacInnes   +3 more
doaj   +1 more source

Network covert channels capacity limitation by adding random delays before packet sending

open access: yesБезопасность информационных технологий, 2021
Attention to covert channels has largely increased due to the documents published by E. Snowden, which described the software and hardware embedding that implement undeclared features of covert information transfer in the Huawei and Juniper network ...
Anna I. Belozubova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy