Report: Covert channel vulnerabilities in anonymity systems Steven J.
Murdoch December 2007.
Demystifying Digital Steganography [A Secret art of Computer Science] by
Joydeep Bakshi 14-MAY-2007.
S. Zander, G. Armitage, P. Branch. A Survey of Covert Channels and
Countermeasures in Computer Network Protocols. IEEE Communications Surveys
and Tutorials, 9(3):44-57, October 2007.
J. Murdoch, S. Lewis. Embedding Covert Channels into TCP/IP. In Proceedings
of 7th Information Hiding Workshop, June 2005.
D. Llamas, C. Allison, A. Miller. Covert Channels in Internet Protocols: A
Survey. In Proceedings of the 6th Annual Postgraduate Symposium about the
Convergence of Telecommunications, Networking and Broadcasting, PGNET 2005,
S. Cabuk, C. E. Brodley, C. Shields. IP Covert Timing Channels: Design and
Detection. In Proceedings of 11th ACM conference on Computer and
Communications Security (CCS), pages 178-187, October 25-29 2004.
L. Hélouët, C. Jard, M. Zeitoun. Covert Channels Detection in Protocols
Using Scenarios. In Proceedings of Workshop on Security Protocols
Verification (SPV), April 2003.
K. Ahsan, Covert Channel Analysis and Data Hiding in TCP/IP, M.A.Sc. thesis,
Dept. of Electrical and Computer Engineering, University of Toronto, August
John Giffin i inni, Covert Messaging Through TCP Timestamps, Massachusetts
Institute of Technology, 2002.
Ahsan and D. Kundur, Practical data hiding in TCP/IP, Proc. ACM Workshop on
Multimedia Security, 2002.
J. Millen. 20 Years of Covert Channel Modeling and Analysis. In Proceedings
of IEEE Symposium on Security and Privacy, pages 113-114, May 1999.
- C. H.
Rowland. Covert Channels in the TCP/IP Protocol Suite. First Monday, Peer
Reviewed Journal on the Internet, July 1997.
T. Handel and M. Sandford., “Hiding data in the OSI network model,”
(Cambridge, U.K.), First International Workshop on Information Hiding,
- J. McHugh. Covert
Channel Analysis, chapter 8. Naval Research Laboratory, December
Kang, I.S. Moskowitz, D.C. Lee, "A network version of the Pump," sp, p.
0144, 1995 IEEE Symposium on Security and Privacy, 1995.
Moskowitz, M. H. Kang. Covert Channels - Here to Stay? In Proceedings of 9th
Annual Conference on Computer Assurance, pages 235-244, 1994.
C. Landwehr et al., “A Taxonomy of Computer Program Security Flaws, with
Examples,” ACM Computing Surveys, vol. 26, no. 3, 1994.
G. R. Andrews, R. P. Reitman. An Axiomatic Approach to Information Flow in
Programs. ACM Transaction on Programming Languages and Systems, 2(1):56-76,
B. Lipner. A Comment on the Confinement Problem. In Proceedings of the fifth
ACM Symposium on Operating Systems, 1975.
Lampson. A Note on the Confinement Problem. Communication of the ACM,
16(10):613-615, October 1973.
Application Layer Covert Channel
Zbigniew Kwecka, Application Layer Covert Channel Analysis and Detection.
Napier University, 2006. +
A. Singh, O. Nordström, C. Lu, A. L. M. dos Santos. Malicious ICMP Tunneling:
Defense against the Vulnerability. In Proceedings of 8th Australasian
Conference on Information Security and Privacy (ACISP), pages 226-235, July
Simon Castro, Covert Channel and Tunneling over the HTTP protocol Detection
: GW implementation theoretical design, Gray-World Team, v1.1 - November
Norka B. Lucena et al,Semantics-Preserving Application-Layer Protocol
Nick Estrada et al, An Application Layer Covert Channel: Information Hiding
With Chaffing, December 9, 1999.