Skip to main content
The concept of covert channels has been visited frequently by academia in a quest to analyse their occurrence and prevention in trusted systems. This has lead to a wide variety of approaches being developed to prevent and identify such... more
    • by 
    •   11  
      Information SecurityRisk ManagementCovert ChannelsInformation Assurance
Network covert channels are used to hide communication inside network protocols. Within the last decades, various techniques for covert channels arose. We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that... more
    • by  and +1
    •   9  
      Computer ScienceNetwork SecurityComputer NetworksTaxonomy
    • by 
    •   21  
      Relational DatabaseMachine LearningData MiningDatabase Systems
    • by 
    •   15  
      Information SystemsComputer ScienceCovert ChannelsComputer Software
“YOU, the U-Bomb, or ‘YOU-Bomb goes Kabloom’: An Essay on Anonymity, Risibility, & Quantum Subjectivity,” published without author page-proofs ∴ with many odd glitches and with sections that had been deleted in the final draft (oh well!)... more
    • by 
    •   61  
      RhetoricRadiationMixed MethodsMixed Methodologies
Considering the wide range of functionalities provided by smartphones, smartphone-users’ privacy and security of their personal information is of vital importance. Android has been the most targeted platform for malware attacks,... more
    • by 
    •   4  
      Covert ChannelsMobile SecurityOvertCollusion Attack
This paper looks at the difficulty in mapping covert networks. Analyzing networks after an event is fairly easy for prosecution purposes. Mapping covert networks to prevent criminal activity is much more difficult. We examine the network... more
    • by 
    •   5  
      Covert ChannelsSocial Network Analysis (SNA)Counter terrorism9/11 Literature
Zero Knowledge Proof and Serverless Systems are two relatively infant fields of research, which respectively address the issues of con fidentiality of user identity, and eliminating single points of failure. These ideas do pose a fair... more
    • by  and +1
    •   12  
      Artificial IntelligenceLiteraturePoetryNetwork Security
Security in building automation systems (BAS) re- cently became a topic in the security community. BAS form a part of enterprise networks and can be utilized to gain access to a company network or to violate a security policy. Up to... more
    • by 
    •   14  
      Network SecurityAccess ControlCovert ChannelsNetwork Steganography
A methodology for designing content based digital signatures which can be used to authenticate images is presented. A continuous measure of authenticity is presented which forms the basis of this methodology. Using this methodology... more
    • by 
    •   4  
      Image ProcessingCovert ChannelsCyber SecurityAuthentication Protocols
Malicious actors in the world are using more ingenuity than ever for both data infiltration and exfiltration purposes, also known as command and control communications. In this paper I aim to describe a system that could be used to send... more
    • by 
    •   5  
      Covert ChannelsMalwareMalware DetectionMalware Research
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques occurred which are based on the capability of protocol switching. There are currently... more
    • by 
    •   10  
      Information SecurityNetwork SecurityCovert ChannelsNetwork Steganography
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the temperature and humidity, as well as the type of crystal. The main... more
    • by 
    •   13  
      Computer ScienceComputer NetworksSecurityWireless Sensor Networks
Network steganography is a relatively new discipline which studies different steganographic techniques that utilize network protocols for data hiding. Internet of Things (IoT) is a concept which integrates billions of embedded devices... more
    • by 
    •   5  
      Covert ChannelsNetwork SteganographyData HidingInternet of Things (IoT)
ains how roughness is a channel. This experimental research tries to explore (n) by making 8 m length, 40 cm width and 40 cm height laboratory flume with adjustable slope. The flume was used to carry out a total of 72 experiments with 4... more
    • by 
    •   6  
      Covert ChannelsIon ChannelsMarketing channelsInnovation in Marketing Channels
Network covert channels are policy-breaking and stealthy commu- nication channels in computer networks. These channels can be used to bypass Internet censorship, to exfiltrate data without raising attention, to allow a safe and stealthy... more
    • by 
    •   9  
      Information SecurityCovert ChannelsNetwork SteganographySteganography
Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets.... more
    • by 
    •   10  
      Computer ScienceNetwork SecurityCovert ChannelsProtocols
Malicious actors in the world are using more ingenuity than ever for both data infiltration and exfiltration purposes, also known as command and control communications. In this paper I aim to describe a system that could be used to send... more
    • by 
    •   6  
      Covert ChannelsMalwareMalware DetectionMalware Research
—Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate λ packets per second for a time period T. Suppose that covert transmitter Alice wishes to... more
    • by 
    •   5  
      Queueing theoryCovert ChannelsWired NetworksPoisson Point Process (PPP)
In this paper, we present new techniques to detect interposition attacks on stream-based connections in local and wide area networks. The approach developed here is general enough to apply uniformly to all circumstances where the... more
    • by 
    •   10  
      Covert ChannelsDNSProtocolsLayer
Modern malware is becoming hard to spot since attackers are increasingly adopting new techniques to elude signature-and rule-based detection mechanisms. Among the others, steganography and information hiding can be used to bypass security... more
    • by 
    •   8  
      Information SecurityNetwork SecurityLinuxCovert Channels
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the control of media for entertainment, or supporting a remote... more
    • by 
    •   8  
      Software ArchitectureCovert ChannelsInformation FlowAutomated Theorem Proving
Covert channels are not a new topic. However they remain an interesting research area. The most proposed techniques are located in the upper layers of the OSI model. In this paper, we present a new covert channel in the data link layer... more
    • by  and +1
    • Covert Channels
In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts. Such an approach allows attackers to act in a stealthy manner, for instance,... more
    • by 
    •   9  
      Information SecurityNetwork SecuritySecurityCovert Channels
Network covert channels enable hidden commu- nication and can be used to break security policies. Within the last years, new techniques for such covert channels arose, including protocol switching covert channels (PSCCs). PSCCs... more
    • by 
    •   8  
      Information SecurityNetwork SecurityCovert ChannelsNetwork Steganography
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze... more
    • by 
    •   4  
      Covert ChannelsSide-channel attackAndroid SecurityAccelerometer
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to... more
    • by 
    •   4  
      Delay Tolerant NetworksCovert ChannelsMessage IntegrityIdentity-Based Cryptography
Abstract In recent scientific literature, network based steganography is regarded as a new research direction in the paradigm of information hiding. Few approaches have been found which embed secret information by altering the length of... more
    • by 
    •   12  
      Computer ScienceCovert ChannelsSteganographyProtocols
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the temperature and humidity, as well as the type of crystal. The main... more
    • by 
    •   13  
      Computer ScienceComputer NetworksSecurityWireless Sensor Networks
Network covert channels have become a sophisticated means for transferring hidden information over the network. Covert channel-internal control protocols, also called micro protocols, have been introduced in the recent years to enhance... more
    • by 
    •   6  
      Computer ScienceNetwork SecurityCovert ChannelsSteganography
Abstract Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address... more
    • by 
    •   13  
      Information TechnologyCovert ChannelsSteganographySystem Design
It is possible to enhance our understanding of what has happened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system... more
    • by 
    •   12  
      CompilersForensicsComputer ForensicsAuditing
Modern malware increasingly exploits information hiding or steganography to elude security frameworks and remain unnoticed for long periods. To this aim, a prime technique relies upon the ability of creating covert channels to bypass the... more
    • by 
    •   4  
      Network SecurityComputer NetworksCovert ChannelsComputer Security
Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication... more
    • by 
    •   14  
      Network SecurityInformation WarfareCovert ChannelsNetwork Security (Networks)
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection.... more
    • by 
    •   10  
      MethodologyCovert ChannelsField-Programmable Gate ArraysLanguage Design
Covert channels are an immense cause of security concern because they can be used to pass malicious messages. The messages could be in form of computer virus, spy programs, terrorist messages, etc. Most available techniques proposed... more
    • by 
    •   8  
      Information SecurityNetwork SecurityCovert ChannelsComputer Security
Intrusion detection is the method of monitoring the actions taking place in a network and diffracts them for doubtful patterns that may identify a network or system attack from someone trying to violate the system. An intrusion detection... more
    • by 
    •   5  
      Information SecuritySensors and SensingWireless Sensor NetworksCovert Channels
The ability of creating covert channels within network traffic is now largely exploited by malware to elude detection, remain unnoticed while exfiltrating data or coordinating an attack. As a consequence, designing a network covert... more
    • by 
    •   5  
      Network SecurityCovert ChannelsComputer SecurityCyber Security
The Flume system is an implementation of decentralized information flow control (DIFC) at the operating system level. Prior work has shown Flume can be implemented as a practical extension to the Linux Operating System, allowing real Web... more
    • by 
    •   14  
      Computer ScienceArtificial IntelligencePrivacyWeb Applications
This paper looks at the difficulty in mapping covert networks. Analyzing networks after an event is fairly easy for prosecution purposes. Mapping covert networks to prevent criminal activity is much more difficult. We examine the network... more
    • by 
    •   7  
      Computer ScienceLiteratureCovert ChannelsSocial Network Analysis (SNA)
    • by 
    •   12  
      CriminologyComputer ScienceInformation TechnologyInformation Management
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags) are increasingly commonplace in hospitals and many other... more
    • by 
    •   8  
      PrivacyRFIDCovert ChannelsIdentification
Covert Channels constitute an important security threat because they are used to ex-filtrate sensitive information, to disseminate malicious code, and, more alarmingly, to transfer instructions to a criminal (or terrorist). This work... more
    • by 
    •   6  
      Information SecurityNetwork SecurityCovert ChannelsTelecommunication
Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol switch- ing covert channels, and adaptive covert channels. These techniques have in common that they rely on... more
    • by 
    •   11  
      Network SecurityTerminologyCovert ChannelsNetwork Steganography
Now a day's there is great attention in the accounting and cyber crime fields because of government regulations in the whole world . Although these regulations force corporations to provide financial transparency, they still commit... more
    • by 
    •   8  
      Network SecurityCovert ChannelsSteganographyNetwork