| |
Covert Channels
- Technical
Report: Covert channel vulnerabilities in anonymity systems Steven J.
Murdoch December 2007.
-
Demystifying Digital Steganography [A Secret art of Computer Science] by
Joydeep Bakshi 14-MAY-2007.
-
S. Zander, G. Armitage, P. Branch. A Survey of Covert Channels and
Countermeasures in Computer Network Protocols. IEEE Communications Surveys
and Tutorials, 9(3):44-57, October 2007.
-
S.
J. Murdoch, S. Lewis. Embedding Covert Channels into TCP/IP. In Proceedings
of 7th Information Hiding Workshop, June 2005.
-
D. Llamas, C. Allison, A. Miller. Covert Channels in Internet Protocols: A
Survey. In Proceedings of the 6th Annual Postgraduate Symposium about the
Convergence of Telecommunications, Networking and Broadcasting, PGNET 2005,
June 2005.
-
S. Cabuk, C. E. Brodley, C. Shields. IP Covert Timing Channels: Design and
Detection. In Proceedings of 11th ACM conference on Computer and
Communications Security (CCS), pages 178-187, October 25-29 2004.
-
L. Hélouët, C. Jard, M. Zeitoun. Covert Channels Detection in Protocols
Using Scenarios. In Proceedings of Workshop on Security Protocols
Verification (SPV), April 2003.
-
K. Ahsan, Covert Channel Analysis and Data Hiding in TCP/IP, M.A.Sc. thesis,
Dept. of Electrical and Computer Engineering, University of Toronto, August
2002.
-
John Giffin i inni, Covert Messaging Through TCP Timestamps, Massachusetts
Institute of Technology, 2002.
- K.
Ahsan and D. Kundur, Practical data hiding in TCP/IP, Proc. ACM Workshop on
Multimedia Security, 2002.
-
J. Millen. 20 Years of Covert Channel Modeling and Analysis. In Proceedings
of IEEE Symposium on Security and Privacy, pages 113-114, May 1999.
- C. H.
Rowland. Covert Channels in the TCP/IP Protocol Suite. First Monday, Peer
Reviewed Journal on the Internet, July 1997.
-
T. Handel and M. Sandford., “Hiding data in the OSI network model,”
(Cambridge, U.K.), First International Workshop on Information Hiding,
May-June 1996.
- J. McHugh. Covert
Channel Analysis, chapter 8. Naval Research Laboratory, December
1995.
- M.H.
Kang, I.S. Moskowitz, D.C. Lee, "A network version of the Pump," sp, p.
0144, 1995 IEEE Symposium on Security and Privacy, 1995.
- S.
Moskowitz, M. H. Kang. Covert Channels - Here to Stay? In Proceedings of 9th
Annual Conference on Computer Assurance, pages 235-244, 1994.
-
C. Landwehr et al., “A Taxonomy of Computer Program Security Flaws, with
Examples,” ACM Computing Surveys, vol. 26, no. 3, 1994.
-
G. R. Andrews, R. P. Reitman. An Axiomatic Approach to Information Flow in
Programs. ACM Transaction on Programming Languages and Systems, 2(1):56-76,
1980.
-
S.
B. Lipner. A Comment on the Confinement Problem. In Proceedings of the fifth
ACM Symposium on Operating Systems, 1975.
- B.
Lampson. A Note on the Confinement Problem. Communication of the ACM,
16(10):613-615, October 1973.
Application Layer Covert Channel
-
Zbigniew Kwecka, Application Layer Covert Channel Analysis and Detection.
Napier University, 2006. +
Presentation
-
A. Singh, O. Nordström, C. Lu, A. L. M. dos Santos. Malicious ICMP Tunneling:
Defense against the Vulnerability. In Proceedings of 8th Australasian
Conference on Information Security and Privacy (ACISP), pages 226-235, July
2003.
-
Simon Castro, Covert Channel and Tunneling over the HTTP protocol Detection
: GW implementation theoretical design, Gray-World Team, v1.1 - November
2003.
-
Norka B. Lucena et al,Semantics-Preserving Application-Layer Protocol
Steganography.
-
Nick Estrada et al, An Application Layer Covert Channel: Information Hiding
With Chaffing, December 9, 1999.
|