Covert Channels

  1. Technical Report: Covert channel vulnerabilities in anonymity systems Steven J. Murdoch December 2007.
  2. Demystifying Digital Steganography [A Secret art of Computer Science] by Joydeep Bakshi 14-MAY-2007.
  3. S. Zander, G. Armitage, P. Branch. A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys and Tutorials, 9(3):44-57, October 2007.
  4. S. J. Murdoch, S. Lewis. Embedding Covert Channels into TCP/IP. In Proceedings of 7th Information Hiding Workshop, June 2005.
  5. D. Llamas, C. Allison, A. Miller. Covert Channels in Internet Protocols: A Survey. In Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET 2005, June 2005.
  6. S. Cabuk, C. E. Brodley, C. Shields. IP Covert Timing Channels: Design and Detection. In Proceedings of 11th ACM conference on Computer and Communications Security (CCS), pages 178-187, October 25-29 2004.
  7. L. Hélouët, C. Jard, M. Zeitoun. Covert Channels Detection in Protocols Using Scenarios. In Proceedings of Workshop on Security Protocols Verification (SPV), April 2003.
  8. K. Ahsan, Covert Channel Analysis and Data Hiding in TCP/IP, M.A.Sc. thesis, Dept. of Electrical and Computer Engineering, University of Toronto, August 2002.
  9. John Giffin i inni, Covert Messaging Through TCP Timestamps, Massachusetts Institute of Technology, 2002.
  10. K. Ahsan and D. Kundur, Practical data hiding in TCP/IP, Proc. ACM Workshop on
    Multimedia Security, 2002.
  11. J. Millen. 20 Years of Covert Channel Modeling and Analysis. In Proceedings of IEEE Symposium on Security and Privacy, pages 113-114, May 1999.
  12. C. H. Rowland. Covert Channels in the TCP/IP Protocol Suite. First Monday, Peer Reviewed Journal on the Internet, July 1997.
  13. T. Handel and M. Sandford., “Hiding data in the OSI network model,” (Cambridge, U.K.), First International Workshop on Information Hiding, May-June 1996.
  14. J. McHugh. Covert Channel Analysis, chapter 8. Naval Research Laboratory, December 1995.
  15. M.H. Kang, I.S. Moskowitz, D.C. Lee, "A network version of the Pump," sp, p. 0144, 1995 IEEE Symposium on Security and Privacy, 1995.
  16. S. Moskowitz, M. H. Kang. Covert Channels - Here to Stay? In Proceedings of 9th Annual Conference on Computer Assurance, pages 235-244, 1994.
  17. C. Landwehr et al., “A Taxonomy of Computer Program Security Flaws, with Examples,” ACM Computing Surveys, vol. 26, no. 3, 1994.
  18. G. R. Andrews, R. P. Reitman. An Axiomatic Approach to Information Flow in Programs. ACM Transaction on Programming Languages and Systems, 2(1):56-76, 1980.
  19. S. B. Lipner. A Comment on the Confinement Problem. In Proceedings of the fifth ACM Symposium on Operating Systems, 1975.
  20. B. Lampson. A Note on the Confinement Problem. Communication of the ACM, 16(10):613-615, October 1973.

Application Layer Covert Channel

  1. Zbigniew Kwecka, Application Layer Covert Channel Analysis and Detection. Napier University, 2006. + Presentation
  2. A. Singh, O. Nordström, C. Lu, A. L. M. dos Santos. Malicious ICMP Tunneling: Defense against the Vulnerability. In Proceedings of 8th Australasian Conference on Information Security and Privacy (ACISP), pages 226-235, July 2003.
  3. Simon Castro, Covert Channel and Tunneling over the HTTP protocol Detection : GW implementation theoretical design, Gray-World Team, v1.1 - November 2003.
  4. Norka B. Lucena et al,Semantics-Preserving Application-Layer Protocol Steganography.
  5. Nick Estrada et al, An Application Layer Covert Channel: Information Hiding With Chaffing, December 9, 1999.