Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2022
Covert Channels in Network Time Security
IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia SecurityPages 69–79https://doi.org/10.1145/3531536.3532947Network Time Security (NTS) specified in RFC8915 is a mechanism to provide cryptographic security for clock synchronization using the Network Time Protocol (NTP) as foundation. By using Transport Layer Security (TLS) and Authenticated Encryption with ...
- articleOctober 2016
Covert channel-internal control protocols: attacks and defense
Security and Communication Networks (SACN), Volume 9, Issue 15Pages 2986–2997https://doi.org/10.1002/sec.1471Network covert channels have become a sophisticated means for transferring hidden information over the network. Covert channel-internal control protocols, also called micro protocols, have been introduced in the recent years to enhance capabilities of ...
- ArticleAugust 2015
Countermeasures for Covert Channel-Internal Control Protocols
ARES '15: Proceedings of the 2015 10th International Conference on Availability, Reliability and SecurityPages 422–428https://doi.org/10.1109/ARES.2015.88Network covert channels have become a sophisticated means for transferring hidden information over the network, and thereby breaking the security policy of a system. Covert channel-internal control protocols, called micro protocols, have been introduced ...
- research-articleSeptember 2011
A square-root law for active wardens
MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and securityPages 87–92https://doi.org/10.1145/2037252.2037268The Square Root Law of Ker, Filler and Fridrich establishes asymptotic capacity limits for steganographic communication, caused by the watchful eye of a passive warden. We exhibit a separate fundamental limit of steganographic communication caused by a ...
- ArticleMay 2005
Covert channels in IPv6
PET'05: Proceedings of the 5th international conference on Privacy Enhancing TechnologiesPages 147–166https://doi.org/10.1007/11767831_10A covert channel is a communication path that allows transferring information in a way that violates a system security policy. Because of their concealed nature, detecting and preventing covert channels are obligatory security practices. In this paper, ...